General

  • Target

    3668e6f72873774b3690b39760da09fee2b2f62d82904c96dc68b4e7cd2078ef.exe

  • Size

    446KB

  • Sample

    241124-t3rvksykex

  • MD5

    1ae6ccebe21285a27c01b1c8e0597566

  • SHA1

    187c4860558ac7b877f9866da6270bd689d10d47

  • SHA256

    3668e6f72873774b3690b39760da09fee2b2f62d82904c96dc68b4e7cd2078ef

  • SHA512

    9a41f582ae893cc8de344b81e9e73a5831d7249b047e547a65036bc76f5149bc6955118809e8d2760ccb44b813cc1f15c5a170161018bb9cb899010cf30a33d6

  • SSDEEP

    12288:cMrYy90xPvJxOs2F5+La14f5JrPufoauvostb:UyIHJxOs2Fqa+zrS6vo0b

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      3668e6f72873774b3690b39760da09fee2b2f62d82904c96dc68b4e7cd2078ef.exe

    • Size

      446KB

    • MD5

      1ae6ccebe21285a27c01b1c8e0597566

    • SHA1

      187c4860558ac7b877f9866da6270bd689d10d47

    • SHA256

      3668e6f72873774b3690b39760da09fee2b2f62d82904c96dc68b4e7cd2078ef

    • SHA512

      9a41f582ae893cc8de344b81e9e73a5831d7249b047e547a65036bc76f5149bc6955118809e8d2760ccb44b813cc1f15c5a170161018bb9cb899010cf30a33d6

    • SSDEEP

      12288:cMrYy90xPvJxOs2F5+La14f5JrPufoauvostb:UyIHJxOs2Fqa+zrS6vo0b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks