General

  • Target

    82acfc82b865246d8db55c0b48ea07105d92d1bb422d238a28e105e0a89ee3a4

  • Size

    550KB

  • Sample

    241111-ahqx1a1ncr

  • MD5

    237eaf241b250841a21cd1d6077f269c

  • SHA1

    e7c20a4336d001f37d1ac9e3d1503d08e30ce435

  • SHA256

    82acfc82b865246d8db55c0b48ea07105d92d1bb422d238a28e105e0a89ee3a4

  • SHA512

    4ad713591ac1afc73d6b16f91aa28c80926c8bd4d843a5f44227add496a9fd65893fb8bd2cd50dbdc2a97f89c446af12af4eb5083776a31935b919cc8b92121a

  • SSDEEP

    12288:cMr4y90ozkyRSVVQNFz0eNjEJDQ+jwjybudS:0ytUVCLweNjEy+ufdS

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      82acfc82b865246d8db55c0b48ea07105d92d1bb422d238a28e105e0a89ee3a4

    • Size

      550KB

    • MD5

      237eaf241b250841a21cd1d6077f269c

    • SHA1

      e7c20a4336d001f37d1ac9e3d1503d08e30ce435

    • SHA256

      82acfc82b865246d8db55c0b48ea07105d92d1bb422d238a28e105e0a89ee3a4

    • SHA512

      4ad713591ac1afc73d6b16f91aa28c80926c8bd4d843a5f44227add496a9fd65893fb8bd2cd50dbdc2a97f89c446af12af4eb5083776a31935b919cc8b92121a

    • SSDEEP

      12288:cMr4y90ozkyRSVVQNFz0eNjEJDQ+jwjybudS:0ytUVCLweNjEy+ufdS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks