General

  • Target

    05a2d3d40d6f143e3f990a5fe4b064a6c615c530b5f2946cf2a730c5df5856e4

  • Size

    469KB

  • Sample

    241108-ezctxsvkex

  • MD5

    b009a6f63bea7ca310275170f7652bed

  • SHA1

    e8fe4b78bf0f2d28aad55c7341b9f9870aa83e5c

  • SHA256

    05a2d3d40d6f143e3f990a5fe4b064a6c615c530b5f2946cf2a730c5df5856e4

  • SHA512

    c964896c2bb2611f33ffaa44dedcb351504b528a406a646057f6fee4beb8df54628430ef1323a1127a5cb9e43ce61e08d0cdcbe0cfb13b6cb563a6e63d760c10

  • SSDEEP

    12288:2Mr6y90Fdjy0V6lrl1LVzql3oWK9f2w2acGh:wyQVV6VL8BoVewB

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      05a2d3d40d6f143e3f990a5fe4b064a6c615c530b5f2946cf2a730c5df5856e4

    • Size

      469KB

    • MD5

      b009a6f63bea7ca310275170f7652bed

    • SHA1

      e8fe4b78bf0f2d28aad55c7341b9f9870aa83e5c

    • SHA256

      05a2d3d40d6f143e3f990a5fe4b064a6c615c530b5f2946cf2a730c5df5856e4

    • SHA512

      c964896c2bb2611f33ffaa44dedcb351504b528a406a646057f6fee4beb8df54628430ef1323a1127a5cb9e43ce61e08d0cdcbe0cfb13b6cb563a6e63d760c10

    • SSDEEP

      12288:2Mr6y90Fdjy0V6lrl1LVzql3oWK9f2w2acGh:wyQVV6VL8BoVewB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks