General

  • Target

    a57910432707511f6a4307ef65149b278f662fd4cdb601f4d5033ac278878f8d

  • Size

    477KB

  • Sample

    241110-dpk7waybnr

  • MD5

    8a1f87c65f9a6aa30ca209e91b9626df

  • SHA1

    06e2a49ada0cee9ebe7d82590d43f8c6ebec58e9

  • SHA256

    a57910432707511f6a4307ef65149b278f662fd4cdb601f4d5033ac278878f8d

  • SHA512

    247c529bc4b998abd75c2c5791aedcc0ed6dcefb7bddfc6c55982bfc7a8208fbfab955b61bd4e769dbe53ee7eec4a1a5e6c6ad456115fd37ae005f66fe1677fa

  • SSDEEP

    6144:KJy+bnr+pp0yN90QE3rstTEDRLLV8IcdQJWTSZf5fgLCgXjjBLdV7ru3cP2KcAHF:jMrty90Q8RLLVVATyBo1Z7wMtPUgR

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      a57910432707511f6a4307ef65149b278f662fd4cdb601f4d5033ac278878f8d

    • Size

      477KB

    • MD5

      8a1f87c65f9a6aa30ca209e91b9626df

    • SHA1

      06e2a49ada0cee9ebe7d82590d43f8c6ebec58e9

    • SHA256

      a57910432707511f6a4307ef65149b278f662fd4cdb601f4d5033ac278878f8d

    • SHA512

      247c529bc4b998abd75c2c5791aedcc0ed6dcefb7bddfc6c55982bfc7a8208fbfab955b61bd4e769dbe53ee7eec4a1a5e6c6ad456115fd37ae005f66fe1677fa

    • SSDEEP

      6144:KJy+bnr+pp0yN90QE3rstTEDRLLV8IcdQJWTSZf5fgLCgXjjBLdV7ru3cP2KcAHF:jMrty90Q8RLLVVATyBo1Z7wMtPUgR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks