General

  • Target

    98706a58435ce019e0568a398084fa5317e28ceb0e42be3213386950e7f75fb9

  • Size

    550KB

  • Sample

    241109-vxt87ayfln

  • MD5

    81fa9e635adbcb24a1efe4e860c5e9a3

  • SHA1

    a3b50d92b69fab76e15c7459e8546bcd69dbaeb9

  • SHA256

    98706a58435ce019e0568a398084fa5317e28ceb0e42be3213386950e7f75fb9

  • SHA512

    7a24ccf3f6c2aa72225c7f15e4c613129d1d2fe688696e0b661683f776f3c4ab9d2c81ca63d65454cfaaee1f4676efe782d660a505cbaaa4728930522cfa6377

  • SSDEEP

    12288:TMrby90ZE5QEpO20KUaqZ5KBnfphNttV9ITQ:wyf5QEpOiMZ6nfT18TQ

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      98706a58435ce019e0568a398084fa5317e28ceb0e42be3213386950e7f75fb9

    • Size

      550KB

    • MD5

      81fa9e635adbcb24a1efe4e860c5e9a3

    • SHA1

      a3b50d92b69fab76e15c7459e8546bcd69dbaeb9

    • SHA256

      98706a58435ce019e0568a398084fa5317e28ceb0e42be3213386950e7f75fb9

    • SHA512

      7a24ccf3f6c2aa72225c7f15e4c613129d1d2fe688696e0b661683f776f3c4ab9d2c81ca63d65454cfaaee1f4676efe782d660a505cbaaa4728930522cfa6377

    • SSDEEP

      12288:TMrby90ZE5QEpO20KUaqZ5KBnfphNttV9ITQ:wyf5QEpOiMZ6nfT18TQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks