General

  • Target

    1f58d362ef1717ef58676c8f234d6d1aa84934553b68b48e8a0fbdbc051f49b7

  • Size

    469KB

  • Sample

    241109-rhkjnawcql

  • MD5

    e4f6558c7a9af99e2e106478627ab6a3

  • SHA1

    ccf69f9ebfb32b0f140e55120d1d61bf46c298cf

  • SHA256

    1f58d362ef1717ef58676c8f234d6d1aa84934553b68b48e8a0fbdbc051f49b7

  • SHA512

    2a116d9f210ba1cfa4799d316537140c8ace90a74792511ae5e9af2c398162d5ab4d7e8e92cc4ac1858a20e731dd09f5935da007d0fad0d9810d9db5dca9b739

  • SSDEEP

    12288:vMrmy90crrSuETVtAMhvJZX3yky6cAyy0PRlCI+:FyTrM7fhvJZXw6cXyYRlCI+

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      1f58d362ef1717ef58676c8f234d6d1aa84934553b68b48e8a0fbdbc051f49b7

    • Size

      469KB

    • MD5

      e4f6558c7a9af99e2e106478627ab6a3

    • SHA1

      ccf69f9ebfb32b0f140e55120d1d61bf46c298cf

    • SHA256

      1f58d362ef1717ef58676c8f234d6d1aa84934553b68b48e8a0fbdbc051f49b7

    • SHA512

      2a116d9f210ba1cfa4799d316537140c8ace90a74792511ae5e9af2c398162d5ab4d7e8e92cc4ac1858a20e731dd09f5935da007d0fad0d9810d9db5dca9b739

    • SSDEEP

      12288:vMrmy90crrSuETVtAMhvJZX3yky6cAyy0PRlCI+:FyTrM7fhvJZXw6cXyYRlCI+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks