General

  • Target

    ba7d519f39962b77315d758744b3086a5c7c3be099e4bc80b5b54c28f8f88606

  • Size

    480KB

  • Sample

    241111-jd1q3syqbk

  • MD5

    ad454f5ce48fcc5bf156b514f61b2f42

  • SHA1

    236d676af8bc5d3e8dd415379087b2668e6abf94

  • SHA256

    ba7d519f39962b77315d758744b3086a5c7c3be099e4bc80b5b54c28f8f88606

  • SHA512

    87fda1c1c0811851dfb9de9bdc84d77d066e8e3dc07509d4f3a5fc6685f474f561c127060ee21b0c1e0f5267ddfc31ce73f5a7cd9575a818e65397da6781dd7e

  • SSDEEP

    12288:wMruy901TRZ/Bbq9295daZpbq1DhRvrHY1HtEP2w:OyOBe9MwqdhRvLUHGP2w

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ba7d519f39962b77315d758744b3086a5c7c3be099e4bc80b5b54c28f8f88606

    • Size

      480KB

    • MD5

      ad454f5ce48fcc5bf156b514f61b2f42

    • SHA1

      236d676af8bc5d3e8dd415379087b2668e6abf94

    • SHA256

      ba7d519f39962b77315d758744b3086a5c7c3be099e4bc80b5b54c28f8f88606

    • SHA512

      87fda1c1c0811851dfb9de9bdc84d77d066e8e3dc07509d4f3a5fc6685f474f561c127060ee21b0c1e0f5267ddfc31ce73f5a7cd9575a818e65397da6781dd7e

    • SSDEEP

      12288:wMruy901TRZ/Bbq9295daZpbq1DhRvrHY1HtEP2w:OyOBe9MwqdhRvLUHGP2w

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks