General

  • Target

    8fe46d1b77b1081bd4d1a0449d8f526d14bc6fef6ce4778eb6124694c4614ff7

  • Size

    272KB

  • Sample

    241111-mh4v3syclg

  • MD5

    14d4b95bd7f471453765f5a9dbc9e82a

  • SHA1

    74d2e44861fbedcf10e3eb58a83c6ec9cdc1b53a

  • SHA256

    8fe46d1b77b1081bd4d1a0449d8f526d14bc6fef6ce4778eb6124694c4614ff7

  • SHA512

    b87655a584af065aa68611dccd39e2789fbf5d47ae30917e3b9e614cc7222af25496d3a44275713f357d4ce7aa31bc7dfdfa92c8a7d4f86bfb91a2c8c5a6eb25

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      8fe46d1b77b1081bd4d1a0449d8f526d14bc6fef6ce4778eb6124694c4614ff7

    • Size

      272KB

    • MD5

      14d4b95bd7f471453765f5a9dbc9e82a

    • SHA1

      74d2e44861fbedcf10e3eb58a83c6ec9cdc1b53a

    • SHA256

      8fe46d1b77b1081bd4d1a0449d8f526d14bc6fef6ce4778eb6124694c4614ff7

    • SHA512

      b87655a584af065aa68611dccd39e2789fbf5d47ae30917e3b9e614cc7222af25496d3a44275713f357d4ce7aa31bc7dfdfa92c8a7d4f86bfb91a2c8c5a6eb25

    • SSDEEP

      3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks