General

  • Target

    176fe315f0a20bf029b56934e5f7bef9c0f93f37a46f6db369fe9d56d0b32176N.exe

  • Size

    733KB

  • Sample

    241112-qpca7atdnp

  • MD5

    05aae5136d9f4541dafc2d66ac3b9089

  • SHA1

    ba413e61e05edd8d91512103f4eea3db8a0ebb36

  • SHA256

    b6683ae4d7f9b2aebf316c239ce5fc7d9cc1da774a68be5503e3f00e43b72668

  • SHA512

    1b17aa23576177b528b7779fbd15b671d71d474ec9fbb7139ae37bbcb0024c01773824fc3fe78590dbf344b92c27fd3690d9ed210c08e4d074866a1a2c99ecb6

  • SSDEEP

    12288:NMrKy90WGUha0TiyFqnaUW8DSV6VRVs7Nq9Xgyf6vZ7gtVjCH1TSNGDF0g/6M0rr:jyxa0TtqnHXDSV6xsI9Xgb9gfCVTSUnS

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      176fe315f0a20bf029b56934e5f7bef9c0f93f37a46f6db369fe9d56d0b32176N.exe

    • Size

      733KB

    • MD5

      05aae5136d9f4541dafc2d66ac3b9089

    • SHA1

      ba413e61e05edd8d91512103f4eea3db8a0ebb36

    • SHA256

      b6683ae4d7f9b2aebf316c239ce5fc7d9cc1da774a68be5503e3f00e43b72668

    • SHA512

      1b17aa23576177b528b7779fbd15b671d71d474ec9fbb7139ae37bbcb0024c01773824fc3fe78590dbf344b92c27fd3690d9ed210c08e4d074866a1a2c99ecb6

    • SSDEEP

      12288:NMrKy90WGUha0TiyFqnaUW8DSV6VRVs7Nq9Xgyf6vZ7gtVjCH1TSNGDF0g/6M0rr:jyxa0TtqnHXDSV6xsI9Xgb9gfCVTSUnS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks