General

  • Target

    3bae1c68cf5e422c1a61ba8be07c1fb277af7df63b7f381c742f2651d72cd2c4

  • Size

    438KB

  • Sample

    241116-np8y2svmav

  • MD5

    ed53e9c220ace0a3ba72d2feea6eb2b0

  • SHA1

    73fb6faac6f5c38f85e62c414d7721b2c4c66fcf

  • SHA256

    3bae1c68cf5e422c1a61ba8be07c1fb277af7df63b7f381c742f2651d72cd2c4

  • SHA512

    5c4fe01d43f95de04ba1d2cf142d758aab7694ae4a5559baf8c61848e8a9a18bffcce65d1874643a509a5d6c7d5ae4d762221330920863682d5bde9131074e33

  • SSDEEP

    12288:3Mrcy90F1jHYvyI6WkQau05FksRl710dhG:nyaUvSnjksP710rG

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      3bae1c68cf5e422c1a61ba8be07c1fb277af7df63b7f381c742f2651d72cd2c4

    • Size

      438KB

    • MD5

      ed53e9c220ace0a3ba72d2feea6eb2b0

    • SHA1

      73fb6faac6f5c38f85e62c414d7721b2c4c66fcf

    • SHA256

      3bae1c68cf5e422c1a61ba8be07c1fb277af7df63b7f381c742f2651d72cd2c4

    • SHA512

      5c4fe01d43f95de04ba1d2cf142d758aab7694ae4a5559baf8c61848e8a9a18bffcce65d1874643a509a5d6c7d5ae4d762221330920863682d5bde9131074e33

    • SSDEEP

      12288:3Mrcy90F1jHYvyI6WkQau05FksRl710dhG:nyaUvSnjksP710rG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks