General

  • Target

    b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b

  • Size

    480KB

  • Sample

    241105-w4tfxaxanp

  • MD5

    1111301007c919576925646496c19986

  • SHA1

    9f84d3ef844e593cd465a2ae1ece9c243f32d63b

  • SHA256

    b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b

  • SHA512

    6161ed45c92d143f80dd51c9efec30d740afceda390a24ca90085f4af57ca0c308158c611b771a06c5febef51f113d7b0861f48b100dd8f75f800423f5b2b810

  • SSDEEP

    6144:Khy+bnr+Jp0yN90QELPIeD+OCt9V5i+Si4U1EnpGoW3/GkGeUKNXolWtR1QoTf:rMr1y90RIi7I9DSi46xoW3/vGeHXo8f

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b

    • Size

      480KB

    • MD5

      1111301007c919576925646496c19986

    • SHA1

      9f84d3ef844e593cd465a2ae1ece9c243f32d63b

    • SHA256

      b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b

    • SHA512

      6161ed45c92d143f80dd51c9efec30d740afceda390a24ca90085f4af57ca0c308158c611b771a06c5febef51f113d7b0861f48b100dd8f75f800423f5b2b810

    • SSDEEP

      6144:Khy+bnr+Jp0yN90QELPIeD+OCt9V5i+Si4U1EnpGoW3/GkGeUKNXolWtR1QoTf:rMr1y90RIi7I9DSi46xoW3/vGeHXo8f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks