General

  • Target

    cc83cc581546f89de3d069b1ff7d5037ee0675d34a6d73877d20f27684318cb1

  • Size

    202KB

  • Sample

    241112-dvcgxstfjq

  • MD5

    4d7ce30a55f0b1df8cbab04af091f08c

  • SHA1

    3d75594e86290397fc7d6474b643723535dc108f

  • SHA256

    cc83cc581546f89de3d069b1ff7d5037ee0675d34a6d73877d20f27684318cb1

  • SHA512

    84894923dae0152f8d18c4b778bfbe452a859d06923378df7b2e59d6947ce21957dbc3ebeb908da3c3d4c3a2574980f7bf87081a7c1e9f2d57648b4659f6d6e1

  • SSDEEP

    3072:Kky+bnr+O1M5GWp1icKAArDZz4N9GhbkrNEk6d6KobmnVgAmhu4mNP9Zi8lYn:Kky+bnr+/p0yN90QEuKVgWdjih

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      cc83cc581546f89de3d069b1ff7d5037ee0675d34a6d73877d20f27684318cb1

    • Size

      202KB

    • MD5

      4d7ce30a55f0b1df8cbab04af091f08c

    • SHA1

      3d75594e86290397fc7d6474b643723535dc108f

    • SHA256

      cc83cc581546f89de3d069b1ff7d5037ee0675d34a6d73877d20f27684318cb1

    • SHA512

      84894923dae0152f8d18c4b778bfbe452a859d06923378df7b2e59d6947ce21957dbc3ebeb908da3c3d4c3a2574980f7bf87081a7c1e9f2d57648b4659f6d6e1

    • SSDEEP

      3072:Kky+bnr+O1M5GWp1icKAArDZz4N9GhbkrNEk6d6KobmnVgAmhu4mNP9Zi8lYn:Kky+bnr+/p0yN90QEuKVgWdjih

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks