General

  • Target

    ad559c751dc5391be00895ce78af97a9e4219953389208744b1cb786bed9759c

  • Size

    469KB

  • Sample

    241110-tkrf4azfmp

  • MD5

    735f07a47e0700a26d3a229b708daa4d

  • SHA1

    938d4fd9d688c7633cc5b7fb97ffb0f7c22592a7

  • SHA256

    ad559c751dc5391be00895ce78af97a9e4219953389208744b1cb786bed9759c

  • SHA512

    dccca66b9608b321dafc9745bce249da614a84a1d2210eaf03b3ead15566c9f5d83bcdcbb4bcba47cdf829d64e1d06b8367e7449e2f3f6860017d53b60ec40b8

  • SSDEEP

    6144:KUy+bnr+Yp0yN90QEslQie4xXjpsnv8yG9THvcKi7CiX0kLCD0Rf2fy1+b+KMlls:MMrEy90oQieScv2jRiikLAfy1xhrQ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ad559c751dc5391be00895ce78af97a9e4219953389208744b1cb786bed9759c

    • Size

      469KB

    • MD5

      735f07a47e0700a26d3a229b708daa4d

    • SHA1

      938d4fd9d688c7633cc5b7fb97ffb0f7c22592a7

    • SHA256

      ad559c751dc5391be00895ce78af97a9e4219953389208744b1cb786bed9759c

    • SHA512

      dccca66b9608b321dafc9745bce249da614a84a1d2210eaf03b3ead15566c9f5d83bcdcbb4bcba47cdf829d64e1d06b8367e7449e2f3f6860017d53b60ec40b8

    • SSDEEP

      6144:KUy+bnr+Yp0yN90QEslQie4xXjpsnv8yG9THvcKi7CiX0kLCD0Rf2fy1+b+KMlls:MMrEy90oQieScv2jRiikLAfy1xhrQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks