General

  • Target

    942685baa59a3b5a00559c73b47442e771ee6f035614c955a2a3aa5c484dacf9N

  • Size

    839KB

  • Sample

    241113-3fp7xazra1

  • MD5

    aa7b70e87daab61c7ea9fb29c3efe580

  • SHA1

    4d540aaba407c53830e3742ca01581023d04c539

  • SHA256

    942685baa59a3b5a00559c73b47442e771ee6f035614c955a2a3aa5c484dacf9

  • SHA512

    0d3303910f6e489e34138fd6d846e509de676bcd72839ec3e8f0961359155ceb9df33b79541b5f23b147d8de73416e6025acd99d51519bbb352282252c3f5e26

  • SSDEEP

    12288:LMr9y90XvVXqdFlfGwvVnfrD1hYqx54DW10TrwfTxZn/U3hZGsOL2Q9+RDCab:2y+VopZhfrjZOc9Z/ShYB+RDCab

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      942685baa59a3b5a00559c73b47442e771ee6f035614c955a2a3aa5c484dacf9N

    • Size

      839KB

    • MD5

      aa7b70e87daab61c7ea9fb29c3efe580

    • SHA1

      4d540aaba407c53830e3742ca01581023d04c539

    • SHA256

      942685baa59a3b5a00559c73b47442e771ee6f035614c955a2a3aa5c484dacf9

    • SHA512

      0d3303910f6e489e34138fd6d846e509de676bcd72839ec3e8f0961359155ceb9df33b79541b5f23b147d8de73416e6025acd99d51519bbb352282252c3f5e26

    • SSDEEP

      12288:LMr9y90XvVXqdFlfGwvVnfrD1hYqx54DW10TrwfTxZn/U3hZGsOL2Q9+RDCab:2y+VopZhfrjZOc9Z/ShYB+RDCab

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks