General

  • Target

    bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc

  • Size

    468KB

  • Sample

    241108-b4xhcasejk

  • MD5

    af8a16fdf36d4728e96ebe6aa73a4251

  • SHA1

    02dc804db02e259fbce65ed374bbede5205d586e

  • SHA256

    bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc

  • SHA512

    d6cca4e103451aed0485bc58fb5c88a008ef7ceaba11753069fbfb06bfec3009282570a7fd40df53278cbe1b7323beb9da4c65a196366859251b9d5abd47d314

  • SSDEEP

    6144:K4y+bnr+op0yN90QErZGR62dNLq4DTA1JyVa+VZILwqgAPefuJre11wUZuBJCS+i:0MrQy90b8HvTAPwql7JrWGUYm59s

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc

    • Size

      468KB

    • MD5

      af8a16fdf36d4728e96ebe6aa73a4251

    • SHA1

      02dc804db02e259fbce65ed374bbede5205d586e

    • SHA256

      bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc

    • SHA512

      d6cca4e103451aed0485bc58fb5c88a008ef7ceaba11753069fbfb06bfec3009282570a7fd40df53278cbe1b7323beb9da4c65a196366859251b9d5abd47d314

    • SSDEEP

      6144:K4y+bnr+op0yN90QErZGR62dNLq4DTA1JyVa+VZILwqgAPefuJre11wUZuBJCS+i:0MrQy90b8HvTAPwql7JrWGUYm59s

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks