General

  • Target

    5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3

  • Size

    583KB

  • Sample

    241113-156j3s1aqq

  • MD5

    31df9ad5a69e5a28aa320285d07ceaea

  • SHA1

    5ad9814ecf19ba1bf51fb2a5b6e41e7ce2c0843c

  • SHA256

    5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3

  • SHA512

    0ea84a84869d477fceb0bd74ab55c3eed9d7e0cdf7c91dc687b2957a971e952e27bb61b1fe0acafada65a4f5a8a523eb4cc9ea6f34f07c766e176cadeb8446a6

  • SSDEEP

    12288:LMroy9072br0EnE25LKbmcgLkLwgY3YzMGPasb9:XyxQX25LKbplY3PGSs5

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3

    • Size

      583KB

    • MD5

      31df9ad5a69e5a28aa320285d07ceaea

    • SHA1

      5ad9814ecf19ba1bf51fb2a5b6e41e7ce2c0843c

    • SHA256

      5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3

    • SHA512

      0ea84a84869d477fceb0bd74ab55c3eed9d7e0cdf7c91dc687b2957a971e952e27bb61b1fe0acafada65a4f5a8a523eb4cc9ea6f34f07c766e176cadeb8446a6

    • SSDEEP

      12288:LMroy9072br0EnE25LKbmcgLkLwgY3YzMGPasb9:XyxQX25LKbplY3PGSs5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks