General

  • Target

    856698b1a916bf7e0b78de41778651f869ebd1427b0479364398c720eef89f2f

  • Size

    529KB

  • Sample

    241110-mtsbesykdl

  • MD5

    d2166ab7e0a19e9494ad02675d583ee4

  • SHA1

    2f9c130b7d745a899275b0aee6fad70e908f6595

  • SHA256

    856698b1a916bf7e0b78de41778651f869ebd1427b0479364398c720eef89f2f

  • SHA512

    f25aa288824d4307be6ff8270502c826bcc738f1624725f3ffef62c9bbc4112f1b024b6bbb429cdfdf1dfb0bfdd666fb4c49379ab69f64bd4e6f704f08b0cb41

  • SSDEEP

    12288:PZB5dBYoWSWHz3z8C4yvgnugY1hkUGTkqlvuh8xxDtQ68wg09fCPPJ:PZEozID8C4yU6KUGT3vMm5Qy9aPPJ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      96f65fdd17e0597a18fd472faa0b80452ce17a85ec2bae585131929f905267ed.exe

    • Size

      580KB

    • MD5

      b205d67855c6a9518f454c3df28148d9

    • SHA1

      b5af6bc576551f51aa612d5b2cbc2afe877b7e49

    • SHA256

      96f65fdd17e0597a18fd472faa0b80452ce17a85ec2bae585131929f905267ed

    • SHA512

      a6a5b63c3a326404601746b2f57866cab49a70f640190be93800fd44e03a77ed0b35e3d6b176e8f4156ae52ae65546dd127b615a5e3bff098387b64c29d965fc

    • SSDEEP

      12288:iMrMy90Rx0phzoJAtX96aP4Y4/HNO9NU2CCcjJ0IFnJG:yyOAOSXQK5YtFgcGILG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks