General

  • Target

    9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2

  • Size

    764KB

  • Sample

    241111-m9pkgayfrf

  • MD5

    e2a61c0aa82ebee86dc6a8171cce0f1d

  • SHA1

    5dbb3199637a8b207329ed97205923eaaa2e45ac

  • SHA256

    9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2

  • SHA512

    ef9289acfb4203a575f305d7d303a54d968803442b3193c1553d23554e62d4e63e0d9f3a42c66e0712f04b9bf878ee6e86e803008f1d894ad0b07299983d814b

  • SSDEEP

    12288:WMrMy90fd9SaQVNc4MinjPF5efIEpv2emOSbEiH3KkvI+yw45u/GTB4Od:CySd9SzVN5XF5j+2emOSbEiH3lvPN45B

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2

    • Size

      764KB

    • MD5

      e2a61c0aa82ebee86dc6a8171cce0f1d

    • SHA1

      5dbb3199637a8b207329ed97205923eaaa2e45ac

    • SHA256

      9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2

    • SHA512

      ef9289acfb4203a575f305d7d303a54d968803442b3193c1553d23554e62d4e63e0d9f3a42c66e0712f04b9bf878ee6e86e803008f1d894ad0b07299983d814b

    • SSDEEP

      12288:WMrMy90fd9SaQVNc4MinjPF5efIEpv2emOSbEiH3KkvI+yw45u/GTB4Od:CySd9SzVN5XF5j+2emOSbEiH3lvPN45B

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks