General

  • Target

    42abed12bbc0d477c14ad84d40d0ff584c2d48c8f5c902d8ace0aa0be5c7efb8

  • Size

    769KB

  • Sample

    241111-lsv59a1lek

  • MD5

    f7dd5aac5c26446bd98e1f0fbed4500a

  • SHA1

    d874414c1e54589814bf05510ab364c355678f4d

  • SHA256

    42abed12bbc0d477c14ad84d40d0ff584c2d48c8f5c902d8ace0aa0be5c7efb8

  • SHA512

    6a0964b00960b1ee78d4bd7ae33ed8895b05c51ae9fe8360e963998576a27dfb3ccf745d6d5e846cf9d42e6d6a919da74122cad2777d1b34634e694dfedc78e8

  • SSDEEP

    12288:yMrQy907pHtPNg4hdDwiIOjog5qbhnWtdxhYselL8Pc+u9:SygpNq6BwiI9gY9nkheB6u9

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      42abed12bbc0d477c14ad84d40d0ff584c2d48c8f5c902d8ace0aa0be5c7efb8

    • Size

      769KB

    • MD5

      f7dd5aac5c26446bd98e1f0fbed4500a

    • SHA1

      d874414c1e54589814bf05510ab364c355678f4d

    • SHA256

      42abed12bbc0d477c14ad84d40d0ff584c2d48c8f5c902d8ace0aa0be5c7efb8

    • SHA512

      6a0964b00960b1ee78d4bd7ae33ed8895b05c51ae9fe8360e963998576a27dfb3ccf745d6d5e846cf9d42e6d6a919da74122cad2777d1b34634e694dfedc78e8

    • SSDEEP

      12288:yMrQy907pHtPNg4hdDwiIOjog5qbhnWtdxhYselL8Pc+u9:SygpNq6BwiI9gY9nkheB6u9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks