General

  • Target

    44b46ed7dce096d6ed1f6dacf848df1348e1dfe953e21bfa767419b64d8a09c1

  • Size

    469KB

  • Sample

    241110-qr6b2sxfjn

  • MD5

    ac5f1170ed5bbccfc6eba263ec81d689

  • SHA1

    3da33a726000e660e88a9443c59e828a760c86e1

  • SHA256

    44b46ed7dce096d6ed1f6dacf848df1348e1dfe953e21bfa767419b64d8a09c1

  • SHA512

    5458a52b49b220fd182f7c0b5fe6bf76c6a09d85ef0494c56c9915a2cfcb5d993b20e6bd6a9d6eda96bf66158b3151c46ca9c1ea1f49123cb23e15f414d16dbe

  • SSDEEP

    12288:3Mrzy901/vnsVopJxMmKjbkOm15kiWqqPvTfDONBq9KwDJGg:4yUkVWxMmKvkr1GqqPv/ONBqMuH

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      44b46ed7dce096d6ed1f6dacf848df1348e1dfe953e21bfa767419b64d8a09c1

    • Size

      469KB

    • MD5

      ac5f1170ed5bbccfc6eba263ec81d689

    • SHA1

      3da33a726000e660e88a9443c59e828a760c86e1

    • SHA256

      44b46ed7dce096d6ed1f6dacf848df1348e1dfe953e21bfa767419b64d8a09c1

    • SHA512

      5458a52b49b220fd182f7c0b5fe6bf76c6a09d85ef0494c56c9915a2cfcb5d993b20e6bd6a9d6eda96bf66158b3151c46ca9c1ea1f49123cb23e15f414d16dbe

    • SSDEEP

      12288:3Mrzy901/vnsVopJxMmKjbkOm15kiWqqPvTfDONBq9KwDJGg:4yUkVWxMmKvkr1GqqPv/ONBqMuH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks