General

  • Target

    acb84e474eade018b7c2f3efbd0f6d29b2726e356348fa094a604b8b026667fb

  • Size

    551KB

  • Sample

    241111-cpc1tszkbt

  • MD5

    faea0c25bfeef662984db1b2fc8154ee

  • SHA1

    fc1cb8454ecb9a280c416c34965ae3c0ae0b6228

  • SHA256

    acb84e474eade018b7c2f3efbd0f6d29b2726e356348fa094a604b8b026667fb

  • SHA512

    015825f355f0df0dfbb57e251ca0eef11ace327bace484142556bdabd7ef3db21aedb41b91dd11c0cc726045fd235d465f5374cd47032d7a32482f9f05cf02fd

  • SSDEEP

    12288:tMrKy90ZlukRYETTHNo/EG/KiYgcSIwYi+Uk7yFMy1:vyuRR2/V/kgF5raWR1

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      acb84e474eade018b7c2f3efbd0f6d29b2726e356348fa094a604b8b026667fb

    • Size

      551KB

    • MD5

      faea0c25bfeef662984db1b2fc8154ee

    • SHA1

      fc1cb8454ecb9a280c416c34965ae3c0ae0b6228

    • SHA256

      acb84e474eade018b7c2f3efbd0f6d29b2726e356348fa094a604b8b026667fb

    • SHA512

      015825f355f0df0dfbb57e251ca0eef11ace327bace484142556bdabd7ef3db21aedb41b91dd11c0cc726045fd235d465f5374cd47032d7a32482f9f05cf02fd

    • SSDEEP

      12288:tMrKy90ZlukRYETTHNo/EG/KiYgcSIwYi+Uk7yFMy1:vyuRR2/V/kgF5raWR1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks