General

  • Target

    9826f6b0ca3c63797711378f74ed754b599315170c68db73b26a05ff8cfdcef2

  • Size

    551KB

  • Sample

    241110-vmhsea1cqk

  • MD5

    f31ad07340af3fefae4d4f93cd10f211

  • SHA1

    e9478423286b8b35eb5c171f37f32d7a46ca9f8b

  • SHA256

    9826f6b0ca3c63797711378f74ed754b599315170c68db73b26a05ff8cfdcef2

  • SHA512

    aea49c89ba00a7e5b5e602c2a8d03e60fd4610e22914f4b7091cac2746bd544558e4a3965d8ffe6ff4ab991a8aa8c0b38c5646a456fe189660660c72694ceb42

  • SSDEEP

    12288:RMrKy90jGSOsQtiOd3nC4Cm+Ab7IIMsyKyNIUYJ:rywGhsQ4OdX8Ly7IIM+1B

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      9826f6b0ca3c63797711378f74ed754b599315170c68db73b26a05ff8cfdcef2

    • Size

      551KB

    • MD5

      f31ad07340af3fefae4d4f93cd10f211

    • SHA1

      e9478423286b8b35eb5c171f37f32d7a46ca9f8b

    • SHA256

      9826f6b0ca3c63797711378f74ed754b599315170c68db73b26a05ff8cfdcef2

    • SHA512

      aea49c89ba00a7e5b5e602c2a8d03e60fd4610e22914f4b7091cac2746bd544558e4a3965d8ffe6ff4ab991a8aa8c0b38c5646a456fe189660660c72694ceb42

    • SSDEEP

      12288:RMrKy90jGSOsQtiOd3nC4Cm+Ab7IIMsyKyNIUYJ:rywGhsQ4OdX8Ly7IIM+1B

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks