General

  • Target

    9ceb90d32342d4ca4a0f4ad94cc4295aab097bbab84507af5b0754d167cbd254

  • Size

    714KB

  • Sample

    241106-t4xgfsthpj

  • MD5

    918f71b5be130ea291d27731492f0337

  • SHA1

    794cd4b4e927dd77e1a78217f8fc10762a3b1097

  • SHA256

    9ceb90d32342d4ca4a0f4ad94cc4295aab097bbab84507af5b0754d167cbd254

  • SHA512

    2a3b423ab75c5d703204d3027cd9c5366562f9266eb501c9e5ee30e57d0ec731ecf9c663fc4018dc7605e29a9fd56bc4dbce1dcaff20aa323b68941b730b8dce

  • SSDEEP

    12288:iMrmy90V3Y5s4L+zAv14OrvpRpLMFPRMD5F7/5Sra2bLH/oMRUnaQ:cyY3xSy9YvpLMFWDb7/05b/oOpQ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9ceb90d32342d4ca4a0f4ad94cc4295aab097bbab84507af5b0754d167cbd254

    • Size

      714KB

    • MD5

      918f71b5be130ea291d27731492f0337

    • SHA1

      794cd4b4e927dd77e1a78217f8fc10762a3b1097

    • SHA256

      9ceb90d32342d4ca4a0f4ad94cc4295aab097bbab84507af5b0754d167cbd254

    • SHA512

      2a3b423ab75c5d703204d3027cd9c5366562f9266eb501c9e5ee30e57d0ec731ecf9c663fc4018dc7605e29a9fd56bc4dbce1dcaff20aa323b68941b730b8dce

    • SSDEEP

      12288:iMrmy90V3Y5s4L+zAv14OrvpRpLMFPRMD5F7/5Sra2bLH/oMRUnaQ:cyY3xSy9YvpLMFWDb7/05b/oOpQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks