General

  • Target

    636785ca16f42956ec401dbe4a13e3beafc493cb7067950b526a10d4e36d52db

  • Size

    468KB

  • Sample

    241111-mreybaydme

  • MD5

    a69104e0e3e96e209d6a18af09f579cb

  • SHA1

    96516374857591eea074ad41fb7b6ed2c5567e73

  • SHA256

    636785ca16f42956ec401dbe4a13e3beafc493cb7067950b526a10d4e36d52db

  • SHA512

    d6967c5bbcf0e7ca648a7706fe978086759d44ffbffc3703f223b4ba05ee1a6868acfc6794cdd3d4c783d5c8ecf77c621db219a46fee4b9f59e7c4ab1bfea1bd

  • SSDEEP

    6144:Kty+bnr+lp0yN90QEi0jWNFsVSodqM+Wie/v1XE5kFpzCxqjTeWFdft/+hn5Hurd:bMrNy90s00sVysie/vWuFpzCy9C0977

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      636785ca16f42956ec401dbe4a13e3beafc493cb7067950b526a10d4e36d52db

    • Size

      468KB

    • MD5

      a69104e0e3e96e209d6a18af09f579cb

    • SHA1

      96516374857591eea074ad41fb7b6ed2c5567e73

    • SHA256

      636785ca16f42956ec401dbe4a13e3beafc493cb7067950b526a10d4e36d52db

    • SHA512

      d6967c5bbcf0e7ca648a7706fe978086759d44ffbffc3703f223b4ba05ee1a6868acfc6794cdd3d4c783d5c8ecf77c621db219a46fee4b9f59e7c4ab1bfea1bd

    • SSDEEP

      6144:Kty+bnr+lp0yN90QEi0jWNFsVSodqM+Wie/v1XE5kFpzCxqjTeWFdft/+hn5Hurd:bMrNy90s00sVysie/vWuFpzCy9C0977

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks