General

  • Target

    819cc9998eb7cec12494b2f139afb58a7beff322e605416adb69dac55a0fa2a3

  • Size

    478KB

  • Sample

    241110-c95lks1ker

  • MD5

    8e12e6e00d57d7e00f854718b7fe7910

  • SHA1

    1b70ffed679235a06e54901ea3d6288ac1d2a18a

  • SHA256

    819cc9998eb7cec12494b2f139afb58a7beff322e605416adb69dac55a0fa2a3

  • SHA512

    48d2d2fc4d93f6685a5cca2c5b7bd0c8d7605e4f621548e4b1b3c964e81951bff7e30c8a18fe24eee2290d84660de2db20614134c3a9cd5f22d2ea7f588c7710

  • SSDEEP

    6144:KUy+bnr+Np0yN90QEZburVNIrB/i5MydMlvrC5nnBagmWkRXMWrnwHisqbUoBFZT:oMrZy90fKrV8a5ev+WT6WrnwCHhaTU

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      819cc9998eb7cec12494b2f139afb58a7beff322e605416adb69dac55a0fa2a3

    • Size

      478KB

    • MD5

      8e12e6e00d57d7e00f854718b7fe7910

    • SHA1

      1b70ffed679235a06e54901ea3d6288ac1d2a18a

    • SHA256

      819cc9998eb7cec12494b2f139afb58a7beff322e605416adb69dac55a0fa2a3

    • SHA512

      48d2d2fc4d93f6685a5cca2c5b7bd0c8d7605e4f621548e4b1b3c964e81951bff7e30c8a18fe24eee2290d84660de2db20614134c3a9cd5f22d2ea7f588c7710

    • SSDEEP

      6144:KUy+bnr+Np0yN90QEZburVNIrB/i5MydMlvrC5nnBagmWkRXMWrnwHisqbUoBFZT:oMrZy90fKrV8a5ev+WT6WrnwCHhaTU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks