General

  • Target

    ba6ff477a324541f421f240892bfc55dd21001d48f217d01a6024f5231b6cc2f

  • Size

    480KB

  • Sample

    241108-vvpkxswemn

  • MD5

    7349809b8da55b784d4fdbd65040939e

  • SHA1

    3734bcb44ebbeff7f9f1168236fb6db881063372

  • SHA256

    ba6ff477a324541f421f240892bfc55dd21001d48f217d01a6024f5231b6cc2f

  • SHA512

    98288d7e7fcb7ac7305c4c17e4f381fa33b5397a5937dd061e63415ca9bf2fc2bfa6576e7b84ca00d248961e46eb0cd5e61430574d7883b99d3535ddc632a4e2

  • SSDEEP

    6144:KHy+bnr+jp0yN90QE0V1CzfMAsAG8RmUpz/+8mmDPcV+jdxofCif62wngFtGOtZT:BMr7y90E1hAsr6L+ieiwfrIncbnT

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ba6ff477a324541f421f240892bfc55dd21001d48f217d01a6024f5231b6cc2f

    • Size

      480KB

    • MD5

      7349809b8da55b784d4fdbd65040939e

    • SHA1

      3734bcb44ebbeff7f9f1168236fb6db881063372

    • SHA256

      ba6ff477a324541f421f240892bfc55dd21001d48f217d01a6024f5231b6cc2f

    • SHA512

      98288d7e7fcb7ac7305c4c17e4f381fa33b5397a5937dd061e63415ca9bf2fc2bfa6576e7b84ca00d248961e46eb0cd5e61430574d7883b99d3535ddc632a4e2

    • SSDEEP

      6144:KHy+bnr+jp0yN90QE0V1CzfMAsAG8RmUpz/+8mmDPcV+jdxofCif62wngFtGOtZT:BMr7y90E1hAsr6L+ieiwfrIncbnT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks