General

  • Target

    9f424187473489dfd121135e3e74ef4df04d901b368d62e0b45be95cf285274c

  • Size

    469KB

  • Sample

    241108-z65hqsyrb1

  • MD5

    a718d5d1a97ec5f2f594f59422c7fca9

  • SHA1

    787dfd35b1aa64cc9971a87f2db0ac19b2c49a0f

  • SHA256

    9f424187473489dfd121135e3e74ef4df04d901b368d62e0b45be95cf285274c

  • SHA512

    549e7f04d7043e809faa12860155a0176e7b4c54c274a2cef9ea748294a2bd8e48450394bc8294a44b5d0f169bbb1c15a2ee744469afda7f16246b0ba0f35a12

  • SSDEEP

    12288:lMryy90In57QFNMdzQo1QbTeCRsQ7Cksiys:LyNg+/CmCuQf

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9f424187473489dfd121135e3e74ef4df04d901b368d62e0b45be95cf285274c

    • Size

      469KB

    • MD5

      a718d5d1a97ec5f2f594f59422c7fca9

    • SHA1

      787dfd35b1aa64cc9971a87f2db0ac19b2c49a0f

    • SHA256

      9f424187473489dfd121135e3e74ef4df04d901b368d62e0b45be95cf285274c

    • SHA512

      549e7f04d7043e809faa12860155a0176e7b4c54c274a2cef9ea748294a2bd8e48450394bc8294a44b5d0f169bbb1c15a2ee744469afda7f16246b0ba0f35a12

    • SSDEEP

      12288:lMryy90In57QFNMdzQo1QbTeCRsQ7Cksiys:LyNg+/CmCuQf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks