General

  • Target

    1ebe028f378930b59920cdae1a51ba597b09cc6d89e710594a21a741732f18c3

  • Size

    549KB

  • Sample

    230211-lsgb4adg31

  • MD5

    fc164ae5e090d2ce4475061031d825d9

  • SHA1

    9a1cca5b9c2dc5a5499df076070c6153e05e9cdd

  • SHA256

    1ebe028f378930b59920cdae1a51ba597b09cc6d89e710594a21a741732f18c3

  • SHA512

    aaa7d988628bee89eb0e56a88a4cd31b9af94c0525651446cda253efd3f923d557bf2aa894a20ad4d6bac173c8a9fb0ff9b583d23ede3c3ef5f09c73d030d03c

  • SSDEEP

    12288:/Mruy90n8hGTwVCTvwGqYttSWF5SlNi1XdcD7iqy0VJ6BX:hy3VCwGLtZSGVSGqyYkBX

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      1ebe028f378930b59920cdae1a51ba597b09cc6d89e710594a21a741732f18c3

    • Size

      549KB

    • MD5

      fc164ae5e090d2ce4475061031d825d9

    • SHA1

      9a1cca5b9c2dc5a5499df076070c6153e05e9cdd

    • SHA256

      1ebe028f378930b59920cdae1a51ba597b09cc6d89e710594a21a741732f18c3

    • SHA512

      aaa7d988628bee89eb0e56a88a4cd31b9af94c0525651446cda253efd3f923d557bf2aa894a20ad4d6bac173c8a9fb0ff9b583d23ede3c3ef5f09c73d030d03c

    • SSDEEP

      12288:/Mruy90n8hGTwVCTvwGqYttSWF5SlNi1XdcD7iqy0VJ6BX:hy3VCwGLtZSGVSGqyYkBX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks