General

  • Target

    ecea3ed1f963ece11dd8974c1f42623fe250ff0b9a712855ba87a18fce81ace0

  • Size

    724KB

  • Sample

    230212-gdn16sha47

  • MD5

    1729d04dd495bfb84d0e3a04f2addcc2

  • SHA1

    38b54f4b6ac16d3955e757fb60c8300ff6340933

  • SHA256

    ecea3ed1f963ece11dd8974c1f42623fe250ff0b9a712855ba87a18fce81ace0

  • SHA512

    e3e18c0b1653850764196641720df9a3284ef14d00cdc44db22d6bed02d2dfa5ebfce1a02be3bbfcf7f061da5a01b433af1fa0692d6998cc28d01e2f83d7db10

  • SSDEEP

    12288:tMrPy90fCFqV9rquIOX/BefrwM8488pQXIPVbPD6/lkAnVCi+7hGAqKwEx/l:WyGoqvrquDXZef8f488pQXI9/6/lkAVI

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      ecea3ed1f963ece11dd8974c1f42623fe250ff0b9a712855ba87a18fce81ace0

    • Size

      724KB

    • MD5

      1729d04dd495bfb84d0e3a04f2addcc2

    • SHA1

      38b54f4b6ac16d3955e757fb60c8300ff6340933

    • SHA256

      ecea3ed1f963ece11dd8974c1f42623fe250ff0b9a712855ba87a18fce81ace0

    • SHA512

      e3e18c0b1653850764196641720df9a3284ef14d00cdc44db22d6bed02d2dfa5ebfce1a02be3bbfcf7f061da5a01b433af1fa0692d6998cc28d01e2f83d7db10

    • SSDEEP

      12288:tMrPy90fCFqV9rquIOX/BefrwM8488pQXIPVbPD6/lkAnVCi+7hGAqKwEx/l:WyGoqvrquDXZef8f488pQXI9/6/lkAVI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks