General

  • Target

    da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a

  • Size

    477KB

  • Sample

    241111-c8enrstrfq

  • MD5

    f4a3c1ce76636a0a57476ac2194d1250

  • SHA1

    0877b529d412d09b414ef88f3010d6b9b88c27ec

  • SHA256

    da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a

  • SHA512

    2a219e241d60461a57db522aa47fccfd8584393c3c4b10aa485f8355c35b274195985b3fb03acfa896a43c20ad1c81f915e7925e51a339a2bbeb0ec3e9d5427a

  • SSDEEP

    6144:Kjy+bnr+4p0yN90QEGK8BnRtv+znHLM0M19dBLuJsWnZrFd4YICOe/KEvAhxbAew:lMr8y90YDBRuHBnJzrf4LCH/zu8UM3/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a

    • Size

      477KB

    • MD5

      f4a3c1ce76636a0a57476ac2194d1250

    • SHA1

      0877b529d412d09b414ef88f3010d6b9b88c27ec

    • SHA256

      da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a

    • SHA512

      2a219e241d60461a57db522aa47fccfd8584393c3c4b10aa485f8355c35b274195985b3fb03acfa896a43c20ad1c81f915e7925e51a339a2bbeb0ec3e9d5427a

    • SSDEEP

      6144:Kjy+bnr+4p0yN90QEGK8BnRtv+znHLM0M19dBLuJsWnZrFd4YICOe/KEvAhxbAew:lMr8y90YDBRuHBnJzrf4LCH/zu8UM3/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks