General

  • Target

    e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794

  • Size

    468KB

  • Sample

    241110-v9nbeasanc

  • MD5

    336f4a98848166dcc4e11af39eb941dd

  • SHA1

    a091a914dd2cd4a8fa34d08e17f1f74caa444c65

  • SHA256

    e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794

  • SHA512

    7dba766180bf57affa02926a6501cbecca244a0a40f7c680e1915f8584a1a2f931e6728d9867d5be9112f2324868df00f4e3b4cf83c44a2d863394333ca637ce

  • SSDEEP

    12288:sMr4y90NNWyppFgxIFQ4AyNbyRUegLFxE9KT7:8y4AyppCxIC0NbyzgLvE0/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794

    • Size

      468KB

    • MD5

      336f4a98848166dcc4e11af39eb941dd

    • SHA1

      a091a914dd2cd4a8fa34d08e17f1f74caa444c65

    • SHA256

      e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794

    • SHA512

      7dba766180bf57affa02926a6501cbecca244a0a40f7c680e1915f8584a1a2f931e6728d9867d5be9112f2324868df00f4e3b4cf83c44a2d863394333ca637ce

    • SSDEEP

      12288:sMr4y90NNWyppFgxIFQ4AyNbyRUegLFxE9KT7:8y4AyppCxIC0NbyzgLvE0/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks