General

  • Target

    2c558f583ef12070ea83d6d7988c61bd3c8a60145013ba4b823cb30d8fe1e6c3

  • Size

    476KB

  • Sample

    241113-zkzelaslam

  • MD5

    552dc0022f8adf534460b34a01ed8c6f

  • SHA1

    29f5f1cf735a2473058de493168ad5e2a446dd4a

  • SHA256

    2c558f583ef12070ea83d6d7988c61bd3c8a60145013ba4b823cb30d8fe1e6c3

  • SHA512

    5fe66b9f4818cdba0523b1831584e0c5cf4c7121431aeb1e14170dee2b7da697fb33374991bdf910e7966a002caaeb9ddd50858cd3bc059a2d9c23004517ea35

  • SSDEEP

    12288:9MrIy90IHyVN5V0mlQ0z36tvg2RmV2Wm89:1ymVFC0L61gMXWL9

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      2c558f583ef12070ea83d6d7988c61bd3c8a60145013ba4b823cb30d8fe1e6c3

    • Size

      476KB

    • MD5

      552dc0022f8adf534460b34a01ed8c6f

    • SHA1

      29f5f1cf735a2473058de493168ad5e2a446dd4a

    • SHA256

      2c558f583ef12070ea83d6d7988c61bd3c8a60145013ba4b823cb30d8fe1e6c3

    • SHA512

      5fe66b9f4818cdba0523b1831584e0c5cf4c7121431aeb1e14170dee2b7da697fb33374991bdf910e7966a002caaeb9ddd50858cd3bc059a2d9c23004517ea35

    • SSDEEP

      12288:9MrIy90IHyVN5V0mlQ0z36tvg2RmV2Wm89:1ymVFC0L61gMXWL9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks