General

  • Target

    d5e12288e8a48a073dc61937062c44f99f59b37ad23550bfb6742e81a78a870d

  • Size

    469KB

  • Sample

    241107-tgqemavgmn

  • MD5

    2c157cc3430fa68e18fbb144cbfe4f03

  • SHA1

    91aea2322a29877aa58e31a16df009471c71d3f8

  • SHA256

    d5e12288e8a48a073dc61937062c44f99f59b37ad23550bfb6742e81a78a870d

  • SHA512

    d8931a0789350f4b179b83addc886337a01cc506e2989ab6885d5c5b2d06cfcf7d21527445d0cae6ca4dd9ab0aff5fbbfb23eac4bd42c2433e4e638e035d5b97

  • SSDEEP

    6144:Key+bnr+Bp0yN90QE7PAtIu+l+3lAx3tUG/iFNOl2dGy9ReJKRfc/JLr7zw+1:6Mrdy90Ct3+ak3tb1wcsXZsvx1

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d5e12288e8a48a073dc61937062c44f99f59b37ad23550bfb6742e81a78a870d

    • Size

      469KB

    • MD5

      2c157cc3430fa68e18fbb144cbfe4f03

    • SHA1

      91aea2322a29877aa58e31a16df009471c71d3f8

    • SHA256

      d5e12288e8a48a073dc61937062c44f99f59b37ad23550bfb6742e81a78a870d

    • SHA512

      d8931a0789350f4b179b83addc886337a01cc506e2989ab6885d5c5b2d06cfcf7d21527445d0cae6ca4dd9ab0aff5fbbfb23eac4bd42c2433e4e638e035d5b97

    • SSDEEP

      6144:Key+bnr+Bp0yN90QE7PAtIu+l+3lAx3tUG/iFNOl2dGy9ReJKRfc/JLr7zw+1:6Mrdy90Ct3+ak3tb1wcsXZsvx1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks