General

  • Target

    9760910a1ef19a7df0f4677a5dcb1d9f444f73143ce9666b452ecf10f4bc9090N.exe

  • Size

    433KB

  • Sample

    241113-r1l57sxkbr

  • MD5

    b060bc7a02f9c118d1721bd756bc2440

  • SHA1

    7d63834e3365f38a0a5dea044d56396cedd1d71d

  • SHA256

    9760910a1ef19a7df0f4677a5dcb1d9f444f73143ce9666b452ecf10f4bc9090

  • SHA512

    308a006e64735f8c4a106d4252c83efe8abc918f50331821f95c9c8074e7a4c424960e59fcbf502c19dc2afe89ed0e7bb14c4ba2a2eccd2e56ee3baae07e43b4

  • SSDEEP

    12288:lMrny9044XRvRErb32/b9lF5uBpFU2IAFX1Ju4jMAegJ1L:myWvib3qupeAl3UtIR

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      9760910a1ef19a7df0f4677a5dcb1d9f444f73143ce9666b452ecf10f4bc9090N.exe

    • Size

      433KB

    • MD5

      b060bc7a02f9c118d1721bd756bc2440

    • SHA1

      7d63834e3365f38a0a5dea044d56396cedd1d71d

    • SHA256

      9760910a1ef19a7df0f4677a5dcb1d9f444f73143ce9666b452ecf10f4bc9090

    • SHA512

      308a006e64735f8c4a106d4252c83efe8abc918f50331821f95c9c8074e7a4c424960e59fcbf502c19dc2afe89ed0e7bb14c4ba2a2eccd2e56ee3baae07e43b4

    • SSDEEP

      12288:lMrny9044XRvRErb32/b9lF5uBpFU2IAFX1Ju4jMAegJ1L:myWvib3qupeAl3UtIR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks