General

  • Target

    073e58d58a921b818616d8b3c03739092397a0e376db6952ba532ab31a63cf46

  • Size

    476KB

  • Sample

    241110-3fc8caxdkp

  • MD5

    7af6e432dfa384481a50147d0f94b3cb

  • SHA1

    2740e14043802260bd3143b7e58479c6556b9ca4

  • SHA256

    073e58d58a921b818616d8b3c03739092397a0e376db6952ba532ab31a63cf46

  • SHA512

    ef20b92cf0ed48506d295dfc901c4002006b2257e53b0b84bae5c348c057c5d9e6909f720581961e02a4cfee73b7435ad0eb1268c00acfa1464d1b45bfcd2f01

  • SSDEEP

    6144:KVy+bnr+wp0yN90QECkqnFzNL4+Z4LytdAnEyjSijrPgJcXBnhuJSMTRKePbW:PMr4y90UbFzOy4+tK+ijrHBcJ/a

Malware Config

Extracted

Family

redline

Botnet

fuka

C2

193.233.20.11:4131

Attributes
  • auth_value

    90eef520554ef188793d77ecc34217bf

Targets

    • Target

      073e58d58a921b818616d8b3c03739092397a0e376db6952ba532ab31a63cf46

    • Size

      476KB

    • MD5

      7af6e432dfa384481a50147d0f94b3cb

    • SHA1

      2740e14043802260bd3143b7e58479c6556b9ca4

    • SHA256

      073e58d58a921b818616d8b3c03739092397a0e376db6952ba532ab31a63cf46

    • SHA512

      ef20b92cf0ed48506d295dfc901c4002006b2257e53b0b84bae5c348c057c5d9e6909f720581961e02a4cfee73b7435ad0eb1268c00acfa1464d1b45bfcd2f01

    • SSDEEP

      6144:KVy+bnr+wp0yN90QECkqnFzNL4+Z4LytdAnEyjSijrPgJcXBnhuJSMTRKePbW:PMr4y90UbFzOy4+tK+ijrHBcJ/a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks