General

  • Target

    594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

  • Size

    468KB

  • Sample

    241109-ld2z9a1mbs

  • MD5

    e6a183c3c8e5ba2e9264a0639986766f

  • SHA1

    db434fa343fb883bd9bce4999e6c541af646e857

  • SHA256

    594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

  • SHA512

    9b0384dd74be99bd0ae35832f9d3074243da1c3cb0a431e16043058288fa935bc730c10e680018127f5550503a72dddadf18a52f7c66c1189d569ebc947c8c2d

  • SSDEEP

    12288:bMryy90JE4FlnkkkDtNBYIjc5y5egMFga9jK:JyGnnkkkDpnEgM6ac

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

    • Size

      468KB

    • MD5

      e6a183c3c8e5ba2e9264a0639986766f

    • SHA1

      db434fa343fb883bd9bce4999e6c541af646e857

    • SHA256

      594551d2ebdb47760b5a07e575d57f23756e671503ba9ce0661cf65d2e422b7d

    • SHA512

      9b0384dd74be99bd0ae35832f9d3074243da1c3cb0a431e16043058288fa935bc730c10e680018127f5550503a72dddadf18a52f7c66c1189d569ebc947c8c2d

    • SSDEEP

      12288:bMryy90JE4FlnkkkDtNBYIjc5y5egMFga9jK:JyGnnkkkDpnEgM6ac

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks