General

  • Target

    fbaa12000c61b2971de20c9d333cd03b21d3826caaa153282cc6dc64625ae29c

  • Size

    480KB

  • Sample

    241105-xzn63axflr

  • MD5

    4c958e7d5a99f43b7358a91c31c13a59

  • SHA1

    e46356807e1bb9ef4fc2fe9a8a78b4b7074f1cde

  • SHA256

    fbaa12000c61b2971de20c9d333cd03b21d3826caaa153282cc6dc64625ae29c

  • SHA512

    1a0e4c72e50229d4b48a949b8434044b24e8e94eb9f91fcbfde73ca8cee6dfe4b5d10bf4a88baac4d10a13ca0bb70ce19d01972be65ba5c46edafe29c4b6304e

  • SSDEEP

    12288:SMrly90TW7nPXRyC92ludadW0eHXw3wll:vymEPXZ9cudVNHXw3K

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      fbaa12000c61b2971de20c9d333cd03b21d3826caaa153282cc6dc64625ae29c

    • Size

      480KB

    • MD5

      4c958e7d5a99f43b7358a91c31c13a59

    • SHA1

      e46356807e1bb9ef4fc2fe9a8a78b4b7074f1cde

    • SHA256

      fbaa12000c61b2971de20c9d333cd03b21d3826caaa153282cc6dc64625ae29c

    • SHA512

      1a0e4c72e50229d4b48a949b8434044b24e8e94eb9f91fcbfde73ca8cee6dfe4b5d10bf4a88baac4d10a13ca0bb70ce19d01972be65ba5c46edafe29c4b6304e

    • SSDEEP

      12288:SMrly90TW7nPXRyC92ludadW0eHXw3wll:vymEPXZ9cudVNHXw3K

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks