General

  • Target

    faa0791780d24538b1d96030b2e2c5bf

  • Size

    251KB

  • Sample

    241110-3gxy5swrbt

  • MD5

    faa0791780d24538b1d96030b2e2c5bf

  • SHA1

    4d780a532caae11aeac46beea088a1cab522d050

  • SHA256

    4425314b032f74f549284faa11336789e3960264d2e5926f8be1f2a6139c8618

  • SHA512

    c4f229b50481a8a325f56fa67678c9a0e243bd69782f1577cb77d77fb712a4ec8918afea8870fa4ebbb0a924b796fc31addb5ba21dc4b6d5dbcd81845df79750

  • SSDEEP

    6144:9cJW/9wVv2yZXN2u6/jt6pfzExxpF04vdTmqX0nBlti:6JWF1+2uK4fzEnpF00dKqXKW

Malware Config

Extracted

Family

redline

Botnet

RuzkiUNIKALNO

C2

193.233.48.58:38989

Attributes
  • auth_value

    c504b04cfbdd4bf85ce6195bcb37fba6

Targets

    • Target

      3ddcc0aafe5fddace36658064e0ab5927144592204255ddd9b2c17341b1995aa

    • Size

      354KB

    • MD5

      889d735f8eac93e54889bf15c1cd3924

    • SHA1

      a47ee9e5a6be1dec209797f4d80a075352cd8d5b

    • SHA256

      3ddcc0aafe5fddace36658064e0ab5927144592204255ddd9b2c17341b1995aa

    • SHA512

      3e378054a5b824de39b80f9088273f231a5981ab26a0f1842cc3003aa2fc35f3e6d2a26f8ab2ee88e72ac0e92eaeb7e0dda877a03db6b71a9aa818a898d26bd0

    • SSDEEP

      6144:c8wjaaLhtDWvDxK2FTtRYJMtKZXN2u6/jtkpfzExxNF0kvdGOfyR:zwjaCDWvDxVTYJZ2uKqfzEnNF04dhf6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks