General

  • Target

    e964e6bb8d64621fd1f6ecbf9cf189728210bc076e5cc11c17d98f64ec9a77ba

  • Size

    550KB

  • Sample

    241109-xrzylazgjm

  • MD5

    8ccbbfba24ce0c77a3ed9d865fb384ac

  • SHA1

    5e550168d7db632bfee27e7b2953104e02f23875

  • SHA256

    e964e6bb8d64621fd1f6ecbf9cf189728210bc076e5cc11c17d98f64ec9a77ba

  • SHA512

    043729fb5516445341f3e55466495794863ba765be8d458a7725ba17398fcb2c245a91a85df4595a1f0b567c8444f49fd3addc609754534074c1b893c0a7a21b

  • SSDEEP

    12288:wMrey90J4BQwV0XAW+DvWIvXdxf+Cj5JL7iQpiDw4SBp:+yFBtVvdJ/fxTelDwl

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      e964e6bb8d64621fd1f6ecbf9cf189728210bc076e5cc11c17d98f64ec9a77ba

    • Size

      550KB

    • MD5

      8ccbbfba24ce0c77a3ed9d865fb384ac

    • SHA1

      5e550168d7db632bfee27e7b2953104e02f23875

    • SHA256

      e964e6bb8d64621fd1f6ecbf9cf189728210bc076e5cc11c17d98f64ec9a77ba

    • SHA512

      043729fb5516445341f3e55466495794863ba765be8d458a7725ba17398fcb2c245a91a85df4595a1f0b567c8444f49fd3addc609754534074c1b893c0a7a21b

    • SSDEEP

      12288:wMrey90J4BQwV0XAW+DvWIvXdxf+Cj5JL7iQpiDw4SBp:+yFBtVvdJ/fxTelDwl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks