General

  • Target

    b67cf003e378efa3492e9a612318205eb486e41e2cba2093250f809d9de03e9d

  • Size

    440KB

  • Sample

    241111-m6e7mayfnb

  • MD5

    59302032f8eaca590b7e04e416ef1210

  • SHA1

    4e56b7a54d5db0872b31d203da4b8cd75300d727

  • SHA256

    b67cf003e378efa3492e9a612318205eb486e41e2cba2093250f809d9de03e9d

  • SHA512

    714e4c9323d0469862f2462acee15e2a910d6719d7e919f9178bbf081af2770eccc46457072c19fd05f039bf7588cff3ae75e7eb4831cddd62fd817f31be3cf6

  • SSDEEP

    12288:EMrby902TR5OIiBn6nM33HBBrZiHf3AqGb5NulhccHd:PyfbdknL3H4FG/ahcc9

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      b67cf003e378efa3492e9a612318205eb486e41e2cba2093250f809d9de03e9d

    • Size

      440KB

    • MD5

      59302032f8eaca590b7e04e416ef1210

    • SHA1

      4e56b7a54d5db0872b31d203da4b8cd75300d727

    • SHA256

      b67cf003e378efa3492e9a612318205eb486e41e2cba2093250f809d9de03e9d

    • SHA512

      714e4c9323d0469862f2462acee15e2a910d6719d7e919f9178bbf081af2770eccc46457072c19fd05f039bf7588cff3ae75e7eb4831cddd62fd817f31be3cf6

    • SSDEEP

      12288:EMrby902TR5OIiBn6nM33HBBrZiHf3AqGb5NulhccHd:PyfbdknL3H4FG/ahcc9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks