General

  • Target

    a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8

  • Size

    469KB

  • Sample

    241109-la9kxssarc

  • MD5

    98b9e992abde4c434996bcff151c3af4

  • SHA1

    1affcb38c2a67c11e810856d2a39e28bbea7309e

  • SHA256

    a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8

  • SHA512

    35be54b9faef939acfe6e99bfd84f157f4d7d68f00bd65608d775a5c7876b8a9974f0f9cba5c5500c4beac9415e564170d0b8c6644d561c285ce0f5a228b5f81

  • SSDEEP

    6144:KIy+bnr+dp0yN90QEJ+5FnR6X+oPZVqPSY1kqIU784jUNFMYHhE6FuY3Nh1ax58g:wMrJy90qS+utSkq4NGhRF7ibSiWnV5f

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8

    • Size

      469KB

    • MD5

      98b9e992abde4c434996bcff151c3af4

    • SHA1

      1affcb38c2a67c11e810856d2a39e28bbea7309e

    • SHA256

      a9898aa15c44fc13b0a9c32025d9fc753b6d4a46e9cc4dbc16d252a3fcb0fcf8

    • SHA512

      35be54b9faef939acfe6e99bfd84f157f4d7d68f00bd65608d775a5c7876b8a9974f0f9cba5c5500c4beac9415e564170d0b8c6644d561c285ce0f5a228b5f81

    • SSDEEP

      6144:KIy+bnr+dp0yN90QEJ+5FnR6X+oPZVqPSY1kqIU784jUNFMYHhE6FuY3Nh1ax58g:wMrJy90qS+utSkq4NGhRF7ibSiWnV5f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks