General

  • Target

    dde91cb951fc996634fabf94e98140487c966758c46f9b7ecef5c6a474f19125

  • Size

    468KB

  • Sample

    241110-tgyq1atkcq

  • MD5

    75ac03425f9444df619ba8534e571e91

  • SHA1

    e7f44266a1f203ac03e38c9a1272f561c2a5fad7

  • SHA256

    dde91cb951fc996634fabf94e98140487c966758c46f9b7ecef5c6a474f19125

  • SHA512

    de975f5cb36d2d8467f77e1911191aacd1493597e2aca819a1b5dd20f7b0c0cf7790c097a59a30cb114debac2fcb02105aeef6f1c5f91f8b10f27ea64e207fb1

  • SSDEEP

    12288:sMr6y90/LHjud7Lz/rEQwSmKziC8gnXxQRhnqttIT:2yuHj0D/ZwKziZgneRxqvIT

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      dde91cb951fc996634fabf94e98140487c966758c46f9b7ecef5c6a474f19125

    • Size

      468KB

    • MD5

      75ac03425f9444df619ba8534e571e91

    • SHA1

      e7f44266a1f203ac03e38c9a1272f561c2a5fad7

    • SHA256

      dde91cb951fc996634fabf94e98140487c966758c46f9b7ecef5c6a474f19125

    • SHA512

      de975f5cb36d2d8467f77e1911191aacd1493597e2aca819a1b5dd20f7b0c0cf7790c097a59a30cb114debac2fcb02105aeef6f1c5f91f8b10f27ea64e207fb1

    • SSDEEP

      12288:sMr6y90/LHjud7Lz/rEQwSmKziC8gnXxQRhnqttIT:2yuHj0D/ZwKziZgneRxqvIT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks