General

  • Target

    4db8316519d7b38dede20965b80a302b9e87ab39fa77bde38f98ca6d9973a82a

  • Size

    761KB

  • Sample

    241111-mglccaxhmk

  • MD5

    ccb66f8c4ea3eb03fc022ed6ad2384b7

  • SHA1

    ebdb6d33e624c05f5552361217bae7c65ca44d4e

  • SHA256

    4db8316519d7b38dede20965b80a302b9e87ab39fa77bde38f98ca6d9973a82a

  • SHA512

    d01bcbeddf80dfa6137a72cdad0d645dbaf1571a9ae31e9aaa3f7c46dd7813db711d80c464da8c45de0f13c5ad8f1c09e35b28848de75a3112e638476afdd8dd

  • SSDEEP

    12288:LMr6y90YBVVt/TPilYTYRSsUEs+MPkMGes63khgl1l8NFRxGITvBICoHPZIJd5+:ty5V//j2JRJsxkMGN5ylTUxGI9ICqIF+

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      4db8316519d7b38dede20965b80a302b9e87ab39fa77bde38f98ca6d9973a82a

    • Size

      761KB

    • MD5

      ccb66f8c4ea3eb03fc022ed6ad2384b7

    • SHA1

      ebdb6d33e624c05f5552361217bae7c65ca44d4e

    • SHA256

      4db8316519d7b38dede20965b80a302b9e87ab39fa77bde38f98ca6d9973a82a

    • SHA512

      d01bcbeddf80dfa6137a72cdad0d645dbaf1571a9ae31e9aaa3f7c46dd7813db711d80c464da8c45de0f13c5ad8f1c09e35b28848de75a3112e638476afdd8dd

    • SSDEEP

      12288:LMr6y90YBVVt/TPilYTYRSsUEs+MPkMGes63khgl1l8NFRxGITvBICoHPZIJd5+:ty5V//j2JRJsxkMGN5ylTUxGI9ICqIF+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks