General

  • Target

    339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4

  • Size

    666KB

  • Sample

    241117-2fg1vsvkan

  • MD5

    fc3118b147113fb44bc89f0060ca28c8

  • SHA1

    5ff4662eb7f089b319feed58ae56b0b0b6b22127

  • SHA256

    339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4

  • SHA512

    67f66df691b340617d5583a3562d3635ddfe06391a05b8d5f3fa0c0e5603d45de70778319be020065f6c24bb6a2e1d4b5c372c2d95a1d86c03253f112d8773f7

  • SSDEEP

    12288:YMrgy90OJc1I9Xu+F/s4S+H88CEnXrPrLyrOdaJIhj06YP7:YysalnnH88JXfo6hj1Yj

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4

    • Size

      666KB

    • MD5

      fc3118b147113fb44bc89f0060ca28c8

    • SHA1

      5ff4662eb7f089b319feed58ae56b0b0b6b22127

    • SHA256

      339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4

    • SHA512

      67f66df691b340617d5583a3562d3635ddfe06391a05b8d5f3fa0c0e5603d45de70778319be020065f6c24bb6a2e1d4b5c372c2d95a1d86c03253f112d8773f7

    • SSDEEP

      12288:YMrgy90OJc1I9Xu+F/s4S+H88CEnXrPrLyrOdaJIhj06YP7:YysalnnH88JXfo6hj1Yj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks