General

  • Target

    9193d951a0901cda90a698f00dfcccedeba8ee207e73f3629f8cdfb1ac4921cc.exe

  • Size

    764KB

  • Sample

    241112-m8mpgs1fra

  • MD5

    ad92dc1ed912b6d203438b1b033da987

  • SHA1

    a68edb9a4e93c79ac3c99649ac91471c781ef17e

  • SHA256

    9193d951a0901cda90a698f00dfcccedeba8ee207e73f3629f8cdfb1ac4921cc

  • SHA512

    4e9b12e41abc150e88e242cf7294950611f01e3b8f75808def12f826d6e8bb57fda87bd9d995ab94d11d46463fadd9662c2046b8ff63c47895a907713c05b998

  • SSDEEP

    12288:RMr1y90eBOZx9EADWO06D4TnL83mYJN7O1JyAtzFTLz6olmjBAG0rtsZsPg:cywZx9j6O0kYnL8BfoUAlN/ulA/1Pg

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      9193d951a0901cda90a698f00dfcccedeba8ee207e73f3629f8cdfb1ac4921cc.exe

    • Size

      764KB

    • MD5

      ad92dc1ed912b6d203438b1b033da987

    • SHA1

      a68edb9a4e93c79ac3c99649ac91471c781ef17e

    • SHA256

      9193d951a0901cda90a698f00dfcccedeba8ee207e73f3629f8cdfb1ac4921cc

    • SHA512

      4e9b12e41abc150e88e242cf7294950611f01e3b8f75808def12f826d6e8bb57fda87bd9d995ab94d11d46463fadd9662c2046b8ff63c47895a907713c05b998

    • SSDEEP

      12288:RMr1y90eBOZx9EADWO06D4TnL83mYJN7O1JyAtzFTLz6olmjBAG0rtsZsPg:cywZx9j6O0kYnL8BfoUAlN/ulA/1Pg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks