General

  • Target

    a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7

  • Size

    714KB

  • Sample

    241111-bg8bbsyfrq

  • MD5

    e0dc655fb225f7e0734cf4224f892441

  • SHA1

    f9e35cf316ed1dce67f9d8e0cdcf9af4a0f584ff

  • SHA256

    a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7

  • SHA512

    56d8b35060717a70f36fccda8be4d64269ee8efa2b584f4aeb98c22247e92f57740d3091d23622d6eac6463392efd27240de22eb52265e14d07483b6c7bbcbcf

  • SSDEEP

    12288:FMrsy90OQPCHZTruOGXEZS1F9nHNJMD5eE556D8KudzHwToMfUna3E23602:RyxQP8ZTGXEZ4FxED4E5E9udTwTocp36

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7

    • Size

      714KB

    • MD5

      e0dc655fb225f7e0734cf4224f892441

    • SHA1

      f9e35cf316ed1dce67f9d8e0cdcf9af4a0f584ff

    • SHA256

      a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7

    • SHA512

      56d8b35060717a70f36fccda8be4d64269ee8efa2b584f4aeb98c22247e92f57740d3091d23622d6eac6463392efd27240de22eb52265e14d07483b6c7bbcbcf

    • SSDEEP

      12288:FMrsy90OQPCHZTruOGXEZS1F9nHNJMD5eE556D8KudzHwToMfUna3E23602:RyxQP8ZTGXEZ4FxED4E5E9udTwTocp36

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks