General

  • Target

    bfb79746f10352bda933b9cd6042bc0f

  • Size

    276KB

  • Sample

    241110-z46m1swarc

  • MD5

    bfb79746f10352bda933b9cd6042bc0f

  • SHA1

    843b6157c6e03d4a3c4b892957d11efefd2f167b

  • SHA256

    c531115ba5bb6e87a3be19aa0e53aecd2249808bde5f94cca07c49d8c763ed49

  • SHA512

    2edfbb4e3afb7c2547185abacd85474fa96eeb9896b3984c1f450462ad5845165f0f363d9805089ebd148704b0c8bf159f7b39530c8de178ad493863a3506832

  • SSDEEP

    6144:Ypd1tYXUrwQ/UYjGWkArilr+q4xV2lNuoA6HN8MD9E0Vw+0BlAQ56K7Kwn1lbT6H:YpntYc7NaWkAe5liwlNuo5HJD9NaooZK

Malware Config

Extracted

Family

redline

Botnet

SomeUNIK

C2

193.233.48.49:41386

Attributes
  • auth_value

    fad47ddd9b9afd6f774347a10ca7d2ff

Targets

    • Target

      unik.bin

    • Size

      432KB

    • MD5

      fb10c0851623de6d672af5a1c660a520

    • SHA1

      759f68629f863843217724ba88be63b91349f4d7

    • SHA256

      ba3ccb4e659bb02a1e400b715cc5c6f9ca2d3bd88252dc526c357ab7b6fa51af

    • SHA512

      888aa63b6e4bd302b9e94d18fd26b5c86cde01a9718bb9e8af13a65094952e8052f00b29cdb41a649c77262421e6d3d681869ea68b9c646f1aecc95cc95b0605

    • SSDEEP

      6144:tWA9rTqjlk7LF5kTbSY9G8mVf+NL9036rKcPR6FyqlNItlD8G+caYl7ppVZPq:39ijluL7ibSt8mVf+03wHkySGJFpp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks