General

  • Target

    f35d7ff51b69717921ee6ab5033d965c23d22b1127e8f225ddfb77632fce24b9

  • Size

    837KB

  • Sample

    241111-ke26zawfnq

  • MD5

    bd757df01ad12051ee4bf47fd16becf0

  • SHA1

    7809fed8bb79a099bab0219f2df3cefff2f860c6

  • SHA256

    f35d7ff51b69717921ee6ab5033d965c23d22b1127e8f225ddfb77632fce24b9

  • SHA512

    3434d6dbed017ebedb6908672327ad0a84d5de7d01b43319b05bf788547148bfe95d90fa18ccc25339aafc60ac06ee897d7575e6dedaab0b6f4fabd44dd36c9b

  • SSDEEP

    12288:aMr2y90eSKuds/8wHYasRU+HVEbdsUDeEqxstQJPDQaxx3tNHnerD:AyuKuds/8wHYasRU+H6h30sKhDtV0D

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      f35d7ff51b69717921ee6ab5033d965c23d22b1127e8f225ddfb77632fce24b9

    • Size

      837KB

    • MD5

      bd757df01ad12051ee4bf47fd16becf0

    • SHA1

      7809fed8bb79a099bab0219f2df3cefff2f860c6

    • SHA256

      f35d7ff51b69717921ee6ab5033d965c23d22b1127e8f225ddfb77632fce24b9

    • SHA512

      3434d6dbed017ebedb6908672327ad0a84d5de7d01b43319b05bf788547148bfe95d90fa18ccc25339aafc60ac06ee897d7575e6dedaab0b6f4fabd44dd36c9b

    • SSDEEP

      12288:aMr2y90eSKuds/8wHYasRU+HVEbdsUDeEqxstQJPDQaxx3tNHnerD:AyuKuds/8wHYasRU+H6h30sKhDtV0D

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks