General

  • Target

    ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897

  • Size

    477KB

  • Sample

    241111-bg2tjsyfrp

  • MD5

    f6a97833be5957a763d3213a78e5f10f

  • SHA1

    f8671d44e9aa41a8f49b56dec11109c809f433ac

  • SHA256

    ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897

  • SHA512

    dc59df0f5069ece9c37528b8d7884d2995178d142175a7def0ba0039d5e27075a2adf736d541029af1eebefc5d729e45d0e7b05cc89b0a6fa747a1f9b0e454e6

  • SSDEEP

    6144:KXy+bnr+Rp0yN90QELHkHNTmH5IdYbwmBkGdZSQvbFqQf+rbSlJEkbB9ztPgT:NMr5y90xHmNTmH5GYEmhmkbreyFjYT

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897

    • Size

      477KB

    • MD5

      f6a97833be5957a763d3213a78e5f10f

    • SHA1

      f8671d44e9aa41a8f49b56dec11109c809f433ac

    • SHA256

      ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897

    • SHA512

      dc59df0f5069ece9c37528b8d7884d2995178d142175a7def0ba0039d5e27075a2adf736d541029af1eebefc5d729e45d0e7b05cc89b0a6fa747a1f9b0e454e6

    • SSDEEP

      6144:KXy+bnr+Rp0yN90QELHkHNTmH5IdYbwmBkGdZSQvbFqQf+rbSlJEkbB9ztPgT:NMr5y90xHmNTmH5GYEmhmkbreyFjYT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks