General

  • Target

    4daa9b3b6ac3126cc5f83378d29511125db8f0870e45bb9ef89a13e57c227751

  • Size

    472KB

  • Sample

    241111-aymwaa1qhl

  • MD5

    e8ffdff01042e8dd74fa4cb1614ad868

  • SHA1

    da877843b2901ad72bf72c781801c9504e174c66

  • SHA256

    4daa9b3b6ac3126cc5f83378d29511125db8f0870e45bb9ef89a13e57c227751

  • SHA512

    51b4589759ecea33c540f7acb344b4cd7adeb6f4ab24c8608810e8a0d80c6b9e2305e0c065a4347dcf742d62b717d5f9732f41198c7056b6693c269a2bba3855

  • SSDEEP

    12288:YMr3y90Tz8PH3zMkeVezh+MxTD3CFu/369FJthS2HaSe:/yazSXFAOpR3CFtHSYe

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      4daa9b3b6ac3126cc5f83378d29511125db8f0870e45bb9ef89a13e57c227751

    • Size

      472KB

    • MD5

      e8ffdff01042e8dd74fa4cb1614ad868

    • SHA1

      da877843b2901ad72bf72c781801c9504e174c66

    • SHA256

      4daa9b3b6ac3126cc5f83378d29511125db8f0870e45bb9ef89a13e57c227751

    • SHA512

      51b4589759ecea33c540f7acb344b4cd7adeb6f4ab24c8608810e8a0d80c6b9e2305e0c065a4347dcf742d62b717d5f9732f41198c7056b6693c269a2bba3855

    • SSDEEP

      12288:YMr3y90Tz8PH3zMkeVezh+MxTD3CFu/369FJthS2HaSe:/yazSXFAOpR3CFtHSYe

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks