General

  • Target

    793024bfd2c987bf5b394b6abf437738b71fa5c8dd25923c7b494723f986d2d1

  • Size

    715KB

  • Sample

    241105-qa82lssdpm

  • MD5

    38cdb93d260f0f68dc8be2b58fedc9fd

  • SHA1

    2583215dcf3777224a63e9c452e40736a5a990da

  • SHA256

    793024bfd2c987bf5b394b6abf437738b71fa5c8dd25923c7b494723f986d2d1

  • SHA512

    f5973e84aeb6efa776bd81e0860be6eb1d405ee9b16dd2b4d7b7427d1290a4cb76636869dc7645c8dd112448f2112a1ad0db57dbf1fde17214993d26dbdae2ea

  • SSDEEP

    12288:RMrXy90Q3Ofbsf29XfBjv7XOw8sQD4ZnEsvvD/MJ0bQfLE2tgbzw4ZRLrlg:2yvefbyqhZ8z4BvvD/w0sbhkS

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      793024bfd2c987bf5b394b6abf437738b71fa5c8dd25923c7b494723f986d2d1

    • Size

      715KB

    • MD5

      38cdb93d260f0f68dc8be2b58fedc9fd

    • SHA1

      2583215dcf3777224a63e9c452e40736a5a990da

    • SHA256

      793024bfd2c987bf5b394b6abf437738b71fa5c8dd25923c7b494723f986d2d1

    • SHA512

      f5973e84aeb6efa776bd81e0860be6eb1d405ee9b16dd2b4d7b7427d1290a4cb76636869dc7645c8dd112448f2112a1ad0db57dbf1fde17214993d26dbdae2ea

    • SSDEEP

      12288:RMrXy90Q3Ofbsf29XfBjv7XOw8sQD4ZnEsvvD/MJ0bQfLE2tgbzw4ZRLrlg:2yvefbyqhZ8z4BvvD/w0sbhkS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks