General

  • Target

    f00b81b27b4ce56f806d425b474a571db287d2cded451f9feeb8e41699238e45

  • Size

    550KB

  • Sample

    241111-bzhtdsyney

  • MD5

    b0e8681efb1fcddbb2341775e40e01c8

  • SHA1

    3de2ac899c703bc088771a4c2cebd646813cf0b5

  • SHA256

    f00b81b27b4ce56f806d425b474a571db287d2cded451f9feeb8e41699238e45

  • SHA512

    efc53f320f8ad39f07665bacb71703dd8cc8cff94e8e3236459afba0a7367ca61155d3e65f9cedee34481ddd4d2b21432d2e169928bf7be7aa1376e7e3521d2b

  • SSDEEP

    12288:eMrVy90BDuVP88oXyPeOtSeM9egMEPGmcjJegmLL:3yKSVE8oCPeU1omQ3Cega

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      f00b81b27b4ce56f806d425b474a571db287d2cded451f9feeb8e41699238e45

    • Size

      550KB

    • MD5

      b0e8681efb1fcddbb2341775e40e01c8

    • SHA1

      3de2ac899c703bc088771a4c2cebd646813cf0b5

    • SHA256

      f00b81b27b4ce56f806d425b474a571db287d2cded451f9feeb8e41699238e45

    • SHA512

      efc53f320f8ad39f07665bacb71703dd8cc8cff94e8e3236459afba0a7367ca61155d3e65f9cedee34481ddd4d2b21432d2e169928bf7be7aa1376e7e3521d2b

    • SSDEEP

      12288:eMrVy90BDuVP88oXyPeOtSeM9egMEPGmcjJegmLL:3yKSVE8oCPeU1omQ3Cega

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks