General

  • Target

    83703089ef2023688edd69d2176127e686dc7a3c2c67f6f3f0e7aeaaba81d5f4

  • Size

    539KB

  • Sample

    241110-16tlxazkgp

  • MD5

    923b52d049d4ce694673080c1bfe6d7b

  • SHA1

    c5750996e242969e9e15546172cfc8327e7bcf80

  • SHA256

    83703089ef2023688edd69d2176127e686dc7a3c2c67f6f3f0e7aeaaba81d5f4

  • SHA512

    2f8a9edb6a6fc05c13905119604caee40eca6affe8e5ee25b8a32fb52a3674b72861c0f5581675ae3b0c24695985ea1a4a96c79447d56817f0a7365f0a2bd4c1

  • SSDEEP

    12288:kMrMy908XYSe0u+OcQ30yJeuPoymjYdrpVccrkBdmaly:AyToF+OjbHPoy/1wcrkrhU

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      83703089ef2023688edd69d2176127e686dc7a3c2c67f6f3f0e7aeaaba81d5f4

    • Size

      539KB

    • MD5

      923b52d049d4ce694673080c1bfe6d7b

    • SHA1

      c5750996e242969e9e15546172cfc8327e7bcf80

    • SHA256

      83703089ef2023688edd69d2176127e686dc7a3c2c67f6f3f0e7aeaaba81d5f4

    • SHA512

      2f8a9edb6a6fc05c13905119604caee40eca6affe8e5ee25b8a32fb52a3674b72861c0f5581675ae3b0c24695985ea1a4a96c79447d56817f0a7365f0a2bd4c1

    • SSDEEP

      12288:kMrMy908XYSe0u+OcQ30yJeuPoymjYdrpVccrkBdmaly:AyToF+OjbHPoy/1wcrkrhU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks