General

  • Target

    294e758276548b2d89206746c447929b854c24d218770cb986bb72581e307113.exe

  • Size

    766KB

  • Sample

    241112-q7bglstglq

  • MD5

    c97cc6de418b4968504f89f9c6c232c7

  • SHA1

    2d1530bf7dde1340d6d76d8534d56cb8ce82f4d9

  • SHA256

    294e758276548b2d89206746c447929b854c24d218770cb986bb72581e307113

  • SHA512

    a49bebf9d833e61a45ec8e142d9088a2dda225b6cfa7cdc7db9a09ffa7ca6d654477b80b90d7c35130e9f5bceff32528d71908ac93279ee85140e43bf1fdc96b

  • SSDEEP

    12288:kMrUy90T0+d7+8uqD/Y7B2o0dRRaSghuqZyFBBIlnqbt1nsciq2yN5:wyO0+5+3o/Y1mmhuqZy+RGhs3xyN5

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      294e758276548b2d89206746c447929b854c24d218770cb986bb72581e307113.exe

    • Size

      766KB

    • MD5

      c97cc6de418b4968504f89f9c6c232c7

    • SHA1

      2d1530bf7dde1340d6d76d8534d56cb8ce82f4d9

    • SHA256

      294e758276548b2d89206746c447929b854c24d218770cb986bb72581e307113

    • SHA512

      a49bebf9d833e61a45ec8e142d9088a2dda225b6cfa7cdc7db9a09ffa7ca6d654477b80b90d7c35130e9f5bceff32528d71908ac93279ee85140e43bf1fdc96b

    • SSDEEP

      12288:kMrUy90T0+d7+8uqD/Y7B2o0dRRaSghuqZyFBBIlnqbt1nsciq2yN5:wyO0+5+3o/Y1mmhuqZy+RGhs3xyN5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks