General

  • Target

    6745c0c072dfd813cdeccdf126997ab5c9942574b0a56a2b97a24e6c488e2167

  • Size

    765KB

  • Sample

    241111-lj1z5swph1

  • MD5

    d78ae547fd24ad6009e0e8801c3fef69

  • SHA1

    383a24ed5c07644acd49caaf64bbac9cc5c3db01

  • SHA256

    6745c0c072dfd813cdeccdf126997ab5c9942574b0a56a2b97a24e6c488e2167

  • SHA512

    db3ab0a8c73f02a633c21b3dc8e722beb8436f9a960ee073068f2b48f0e1d56b0bdf5f108dade8a25d44b6c6085eb5a0b8aad499ef4d7fd67973da3a2b6cee83

  • SSDEEP

    12288:vMruy90EkkocTOvswWccFmlebqWHHbdpBYoGqGlVwyeGhiV53cvt0e0zgA/OEk94:Jyhr/T2swemgHppijqG0vGhtvr0sFEk2

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      6745c0c072dfd813cdeccdf126997ab5c9942574b0a56a2b97a24e6c488e2167

    • Size

      765KB

    • MD5

      d78ae547fd24ad6009e0e8801c3fef69

    • SHA1

      383a24ed5c07644acd49caaf64bbac9cc5c3db01

    • SHA256

      6745c0c072dfd813cdeccdf126997ab5c9942574b0a56a2b97a24e6c488e2167

    • SHA512

      db3ab0a8c73f02a633c21b3dc8e722beb8436f9a960ee073068f2b48f0e1d56b0bdf5f108dade8a25d44b6c6085eb5a0b8aad499ef4d7fd67973da3a2b6cee83

    • SSDEEP

      12288:vMruy90EkkocTOvswWccFmlebqWHHbdpBYoGqGlVwyeGhiV53cvt0e0zgA/OEk94:Jyhr/T2swemgHppijqG0vGhtvr0sFEk2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks