General

  • Target

    c74cab24d2486de1e6cf4ecb8991afee3db04bdc5ecbd192179640f3430cfabd

  • Size

    580KB

  • Sample

    241110-cfj3sawnds

  • MD5

    0906a476f2e35e38ab1eeaa9e3fdea8e

  • SHA1

    c4975ea86cd75c8d863ffda65b9d4fb8240e73dd

  • SHA256

    c74cab24d2486de1e6cf4ecb8991afee3db04bdc5ecbd192179640f3430cfabd

  • SHA512

    05af396811a093b504b90c9fc9f5a1c7172bddf2339f94052f25a74f022d0c5b1981db691d43506f54540299168c280a3b5b3ee26b7eba488aa53f9b10d18412

  • SSDEEP

    12288:9Mrty90r4p80i9B+uBWfUNm3QtShk1sz59YVBlPCrKQDs:UyE4p8X+uBWz38niy/6rKEs

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      c74cab24d2486de1e6cf4ecb8991afee3db04bdc5ecbd192179640f3430cfabd

    • Size

      580KB

    • MD5

      0906a476f2e35e38ab1eeaa9e3fdea8e

    • SHA1

      c4975ea86cd75c8d863ffda65b9d4fb8240e73dd

    • SHA256

      c74cab24d2486de1e6cf4ecb8991afee3db04bdc5ecbd192179640f3430cfabd

    • SHA512

      05af396811a093b504b90c9fc9f5a1c7172bddf2339f94052f25a74f022d0c5b1981db691d43506f54540299168c280a3b5b3ee26b7eba488aa53f9b10d18412

    • SSDEEP

      12288:9Mrty90r4p80i9B+uBWfUNm3QtShk1sz59YVBlPCrKQDs:UyE4p8X+uBWz38niy/6rKEs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks