General

  • Target

    b25c7175a2ef0124cadbc8ec5455b56b8bc4ff15fb83371dce5d68bb5d7e066b

  • Size

    468KB

  • Sample

    241105-cx1f4avnfn

  • MD5

    7121cf5d4ea4f9f2b2d5f0cab223d29e

  • SHA1

    e9df9e26762e263e7e9e41a746648b79ac5980b3

  • SHA256

    b25c7175a2ef0124cadbc8ec5455b56b8bc4ff15fb83371dce5d68bb5d7e066b

  • SHA512

    ea3de160ec52f6e2f43d743649931413e7f442cc5d72d804f13f8f70f16ebd349a495bd1c8c9691fed68b3c9cf07e7920c90bcb6805c19fd699ffeb1d4821575

  • SSDEEP

    6144:Khy+bnr++p0yN90QE5uFo+88AqY8ypIa5o/uh3rIJckmQHuEbxm+hg5Hur92Fsl:HMrSy904AH/p35oGeiuH1597

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      b25c7175a2ef0124cadbc8ec5455b56b8bc4ff15fb83371dce5d68bb5d7e066b

    • Size

      468KB

    • MD5

      7121cf5d4ea4f9f2b2d5f0cab223d29e

    • SHA1

      e9df9e26762e263e7e9e41a746648b79ac5980b3

    • SHA256

      b25c7175a2ef0124cadbc8ec5455b56b8bc4ff15fb83371dce5d68bb5d7e066b

    • SHA512

      ea3de160ec52f6e2f43d743649931413e7f442cc5d72d804f13f8f70f16ebd349a495bd1c8c9691fed68b3c9cf07e7920c90bcb6805c19fd699ffeb1d4821575

    • SSDEEP

      6144:Khy+bnr++p0yN90QE5uFo+88AqY8ypIa5o/uh3rIJckmQHuEbxm+hg5Hur92Fsl:HMrSy904AH/p35oGeiuH1597

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks