General

  • Target

    2e6cc644d077ff415e3dee4f709f1a9e9d7c48910485be336eac02135eea824e

  • Size

    767KB

  • Sample

    241111-lbq5zaxckn

  • MD5

    12be7143c25631d3b4389d1f7a7abe80

  • SHA1

    601722c7cb1a000707fa9bfb98892255de976564

  • SHA256

    2e6cc644d077ff415e3dee4f709f1a9e9d7c48910485be336eac02135eea824e

  • SHA512

    92f7e3bc4ccd40b19a2b97bde16d4afa416561122fc377641157900a42a363f7962cebf21e793b7cd9a14e899403ae2d2eef0a57667695a355b1fb710df61fb9

  • SSDEEP

    12288:bMrly90CXgr104DZh5vFbz26fTMLTgWIF3Xv85tiOuEsKd+e4AMaqvChQMFsXY/6:ayhwK49LNDf8CBf8Ne6hQMhth+

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      2e6cc644d077ff415e3dee4f709f1a9e9d7c48910485be336eac02135eea824e

    • Size

      767KB

    • MD5

      12be7143c25631d3b4389d1f7a7abe80

    • SHA1

      601722c7cb1a000707fa9bfb98892255de976564

    • SHA256

      2e6cc644d077ff415e3dee4f709f1a9e9d7c48910485be336eac02135eea824e

    • SHA512

      92f7e3bc4ccd40b19a2b97bde16d4afa416561122fc377641157900a42a363f7962cebf21e793b7cd9a14e899403ae2d2eef0a57667695a355b1fb710df61fb9

    • SSDEEP

      12288:bMrly90CXgr104DZh5vFbz26fTMLTgWIF3Xv85tiOuEsKd+e4AMaqvChQMFsXY/6:ayhwK49LNDf8CBf8Ne6hQMhth+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks