General

  • Target

    8519ac8f5a2f877cca7d6d698e238128a95913637aa8f82570201ec5a6346a71

  • Size

    480KB

  • Sample

    241111-ahbhbaycpa

  • MD5

    68c6ab8b7d21c018226c3af3e4350f2a

  • SHA1

    71a901263de8a51667f8f0c9165c8ad6b23ba500

  • SHA256

    8519ac8f5a2f877cca7d6d698e238128a95913637aa8f82570201ec5a6346a71

  • SHA512

    8d518ed5401784c720658b105f7abb587519dcc40bcf705264369b9fe3f28c85206483f2c4e9216e53c8baf6296abc637263bb701935580f88caa3ffc38edc32

  • SSDEEP

    6144:KUy+bnr+Rp0yN90QE0vno32srBN6yDxIRFpjY0pRw1HxofCif62gKoHh0CEk:YMr1y904no31z6bHyQw1Kfro5Hb

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      8519ac8f5a2f877cca7d6d698e238128a95913637aa8f82570201ec5a6346a71

    • Size

      480KB

    • MD5

      68c6ab8b7d21c018226c3af3e4350f2a

    • SHA1

      71a901263de8a51667f8f0c9165c8ad6b23ba500

    • SHA256

      8519ac8f5a2f877cca7d6d698e238128a95913637aa8f82570201ec5a6346a71

    • SHA512

      8d518ed5401784c720658b105f7abb587519dcc40bcf705264369b9fe3f28c85206483f2c4e9216e53c8baf6296abc637263bb701935580f88caa3ffc38edc32

    • SSDEEP

      6144:KUy+bnr+Rp0yN90QE0vno32srBN6yDxIRFpjY0pRw1HxofCif62gKoHh0CEk:YMr1y904no31z6bHyQw1Kfro5Hb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks