General

  • Target

    494efed459b342c243a5983a1dd2e76de0b6ca84e75c421ce5dc47a82ad7d5d6

  • Size

    478KB

  • Sample

    241109-t96x3s1ldm

  • MD5

    62dcdfdf625bcb1e7b5c0a35421fae24

  • SHA1

    882e175e793695434189b113cddc04272d0c551d

  • SHA256

    494efed459b342c243a5983a1dd2e76de0b6ca84e75c421ce5dc47a82ad7d5d6

  • SHA512

    3b1c003324c4ac488ffaa8d7824071e53f736762deb7efa05ddc255a61ec9afb8a4bd758eef3f61db6074712de7c163db820947855645163e2a060685f6b8ce1

  • SSDEEP

    12288:LMrry90yl8vzmUp5MtWB5qHP9bppA+pfARnX:Qyt6vzmUzMUo9FfYlX

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      494efed459b342c243a5983a1dd2e76de0b6ca84e75c421ce5dc47a82ad7d5d6

    • Size

      478KB

    • MD5

      62dcdfdf625bcb1e7b5c0a35421fae24

    • SHA1

      882e175e793695434189b113cddc04272d0c551d

    • SHA256

      494efed459b342c243a5983a1dd2e76de0b6ca84e75c421ce5dc47a82ad7d5d6

    • SHA512

      3b1c003324c4ac488ffaa8d7824071e53f736762deb7efa05ddc255a61ec9afb8a4bd758eef3f61db6074712de7c163db820947855645163e2a060685f6b8ce1

    • SSDEEP

      12288:LMrry90yl8vzmUp5MtWB5qHP9bppA+pfARnX:Qyt6vzmUzMUo9FfYlX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks