General

  • Target

    48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145N.exe

  • Size

    202KB

  • Sample

    241112-y8dx5atnbr

  • MD5

    091c713abe2a857856740a49835b9300

  • SHA1

    c1a26d5de4c3ba0fd235d108095adeee9132b88f

  • SHA256

    48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145

  • SHA512

    b7201a6da8eb068a14ee8096f507e9cd2e15ca79d479df8af948569c14288240c5a9b2b41ffd5002f96d24c8ade3f4e0161f64f306bf46a5bb30e63723efffdc

  • SSDEEP

    3072:Kpy+bnr+O1c5GWp1icKAArDZz4N9GhbkrNEk6t6KobmnVgAmhu4mNP9ZirlYn:Kpy+bnr+Hp0yN90QEiKVgWdjiO

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145N.exe

    • Size

      202KB

    • MD5

      091c713abe2a857856740a49835b9300

    • SHA1

      c1a26d5de4c3ba0fd235d108095adeee9132b88f

    • SHA256

      48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145

    • SHA512

      b7201a6da8eb068a14ee8096f507e9cd2e15ca79d479df8af948569c14288240c5a9b2b41ffd5002f96d24c8ade3f4e0161f64f306bf46a5bb30e63723efffdc

    • SSDEEP

      3072:Kpy+bnr+O1c5GWp1icKAArDZz4N9GhbkrNEk6t6KobmnVgAmhu4mNP9ZirlYn:Kpy+bnr+Hp0yN90QEiKVgWdjiO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks