General

  • Target

    594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

  • Size

    468KB

  • Sample

    241109-ld2z9a1mbs

  • MD5

    e6a183c3c8e5ba2e9264a0639986766f

  • SHA1

    db434fa343fb883bd9bce4999e6c541af646e857

  • SHA256

    594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

  • SHA512

    9b0384dd74be99bd0ae35832f9d3074243da1c3cb0a431e16043058288fa935bc730c10e680018127f5550503a72dddadf18a52f7c66c1189d569ebc947c8c2d

  • SSDEEP

    12288:bMryy90JE4FlnkkkDtNBYIjc5y5egMFga9jK:JyGnnkkkDpnEgM6ac

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

    • Size

      468KB

    • MD5

      e6a183c3c8e5ba2e9264a0639986766f

    • SHA1

      db434fa343fb883bd9bce4999e6c541af646e857

    • SHA256

      594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

    • SHA512

      9b0384dd74be99bd0ae35832f9d3074243da1c3cb0a431e16043058288fa935bc730c10e680018127f5550503a72dddadf18a52f7c66c1189d569ebc947c8c2d

    • SSDEEP

      12288:bMryy90JE4FlnkkkDtNBYIjc5y5egMFga9jK:JyGnnkkkDpnEgM6ac

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.