General

  • Target

    91ecf7c5b39d759837737717ad1f5dd5ddd01d4c7241bb4c1e6853e6cf74ec38

  • Size

    529KB

  • Sample

    241108-l74qyazldy

  • MD5

    2d31eb575fd78422677cbe87c3739d32

  • SHA1

    5a64ae5139d302f06b6ed0c41b565bf79e684464

  • SHA256

    91ecf7c5b39d759837737717ad1f5dd5ddd01d4c7241bb4c1e6853e6cf74ec38

  • SHA512

    952d7e3fbffca3bbc3b5d6c18e6a12187d3d263eeee4a79bf35d6d88b61289eb0075ca8bd4e2fab51144d9cbd844342c070e7bcfd2155dd4a48116c97116c440

  • SSDEEP

    12288:UNdIi+3BwI8CKSL5WJlbYYUMJyXI8PNNqUFgx3g1n5sfKAxBlyC:UgP3BwIPKSL58bYYUfY8PN0NgIoC

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      3630b9fd9d3d3f24c1b3116118f7068b48c74201938a8fdfaa4d32116d383abe.exe

    • Size

      580KB

    • MD5

      d8f38558bd9c4a83548ba56ef5e31244

    • SHA1

      b9a5780740c0ce32515eacf5880d8d54c1328b45

    • SHA256

      3630b9fd9d3d3f24c1b3116118f7068b48c74201938a8fdfaa4d32116d383abe

    • SHA512

      407c4ae49e4a2c5a6b10fd92819e04f9a5d96cd8518a3181b9c4cbfeca471214eeb5ad34d0b2863beb1848e39dfbf89f8df1b79b625ee667d206f26af41d1009

    • SSDEEP

      12288:EMrXy90ujBwhs/sT6PrijXwqpdIeOjMq5j2mCgjX4:DyvjWhs/F+jgqpCgyOgj4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks