General

  • Target

    155da235b19ee4da801558059f0123d543ef3d31a6e3a3a5457377ce89ded28c

  • Size

    469KB

  • Sample

    241106-xb8wkaxqdl

  • MD5

    19a498f03d5b098238791de650bb8ba7

  • SHA1

    59fe7e450b72a2827a19b2e08bb404af0fe12153

  • SHA256

    155da235b19ee4da801558059f0123d543ef3d31a6e3a3a5457377ce89ded28c

  • SHA512

    3c6599908444d2014643417f801806d42f350def80931d3891c1524ea064c4db8f665f2577de1b187967b52c5ee76e5a5c7aab5ee411302a35a8dd69c4f850c9

  • SSDEEP

    12288:EMrrX6oNP0LjDHXn3HXno4IYo4IDDDD6TTTTTTT9GWm2GWm2GWm2GWHcy90jLjFh:vX6oNP0LjDHXn3HXno4IYo4IDDDD6TT6

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      155da235b19ee4da801558059f0123d543ef3d31a6e3a3a5457377ce89ded28c

    • Size

      469KB

    • MD5

      19a498f03d5b098238791de650bb8ba7

    • SHA1

      59fe7e450b72a2827a19b2e08bb404af0fe12153

    • SHA256

      155da235b19ee4da801558059f0123d543ef3d31a6e3a3a5457377ce89ded28c

    • SHA512

      3c6599908444d2014643417f801806d42f350def80931d3891c1524ea064c4db8f665f2577de1b187967b52c5ee76e5a5c7aab5ee411302a35a8dd69c4f850c9

    • SSDEEP

      12288:EMrrX6oNP0LjDHXn3HXno4IYo4IDDDD6TTTTTTT9GWm2GWm2GWm2GWHcy90jLjFh:vX6oNP0LjDHXn3HXno4IYo4IDDDD6TT6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks