General

  • Target

    aa78cbc08517b9f1a1820ac47c2dfd26c485092f015b50e728af224f30632f03

  • Size

    480KB

  • Sample

    241105-zp22aaygqr

  • MD5

    9e78f2cd72ce17284bbe6f46316056f6

  • SHA1

    d975ece26670367d2fe55475ad3c00b3049378be

  • SHA256

    aa78cbc08517b9f1a1820ac47c2dfd26c485092f015b50e728af224f30632f03

  • SHA512

    b476dde3d659ec62b9ba1838544e41322b09789473864ab7c6800d38980ef48b3982364abb82943dd3475db22c50a543df85d51e022ee7cebebe550bbd7c5967

  • SSDEEP

    6144:KXy+bnr+fp0yN90QEkse2GLeVSsh5EUreGcX6peUKNXOVomin/j6rl3oq6DQU:VMrfy90HGlsnoGcKpeHXAoP76eD

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      aa78cbc08517b9f1a1820ac47c2dfd26c485092f015b50e728af224f30632f03

    • Size

      480KB

    • MD5

      9e78f2cd72ce17284bbe6f46316056f6

    • SHA1

      d975ece26670367d2fe55475ad3c00b3049378be

    • SHA256

      aa78cbc08517b9f1a1820ac47c2dfd26c485092f015b50e728af224f30632f03

    • SHA512

      b476dde3d659ec62b9ba1838544e41322b09789473864ab7c6800d38980ef48b3982364abb82943dd3475db22c50a543df85d51e022ee7cebebe550bbd7c5967

    • SSDEEP

      6144:KXy+bnr+fp0yN90QEkse2GLeVSsh5EUreGcX6peUKNXOVomin/j6rl3oq6DQU:VMrfy90HGlsnoGcKpeHXAoP76eD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks