General

  • Target

    7e93ffb6e82257e463d7bb3aed1600d80ca68ca4a48a319d9f3c530c8aac81d6.exe

  • Size

    437KB

  • Sample

    241118-vrcrys1hlp

  • MD5

    8484254a02cd177729e2894bb4b24c27

  • SHA1

    86297fcce65b00751299e4ca79124307a1c435b2

  • SHA256

    7e93ffb6e82257e463d7bb3aed1600d80ca68ca4a48a319d9f3c530c8aac81d6

  • SHA512

    0ef4f1ca5570a020849be7f3d6d02bc86021033a49d7c3eb80c5a464cf8a0f2355391a98ccc1a67e0fb5c0ed6da9b585d2a58913b26b85fd1699cd2149340662

  • SSDEEP

    6144:KSy+bnr+vp0yN90QESxnlib4q5mVxp2SL1klJ1Ypsb4qPkh4I5gX8DrQC:qMrny90Axwb4xbplLOrodqcXgXGrQC

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      7e93ffb6e82257e463d7bb3aed1600d80ca68ca4a48a319d9f3c530c8aac81d6.exe

    • Size

      437KB

    • MD5

      8484254a02cd177729e2894bb4b24c27

    • SHA1

      86297fcce65b00751299e4ca79124307a1c435b2

    • SHA256

      7e93ffb6e82257e463d7bb3aed1600d80ca68ca4a48a319d9f3c530c8aac81d6

    • SHA512

      0ef4f1ca5570a020849be7f3d6d02bc86021033a49d7c3eb80c5a464cf8a0f2355391a98ccc1a67e0fb5c0ed6da9b585d2a58913b26b85fd1699cd2149340662

    • SSDEEP

      6144:KSy+bnr+vp0yN90QESxnlib4q5mVxp2SL1klJ1Ypsb4qPkh4I5gX8DrQC:qMrny90Axwb4xbplLOrodqcXgXGrQC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks