General

  • Target

    b17e3f91abc093c2026df4648b096b1993781fb03e4ea1a2b0872a42b04b79bd.exe

  • Size

    202KB

  • Sample

    241115-3nreyaymcr

  • MD5

    5c1d57804de9c2890101ec5c34772eba

  • SHA1

    b4fb0bf3d7a76c30f99cdf1916be40ce8874a5f7

  • SHA256

    b17e3f91abc093c2026df4648b096b1993781fb03e4ea1a2b0872a42b04b79bd

  • SHA512

    c074a1d4c8318d0a90b35434618bd38b2f11501ebfca276c131d7d71d9872da4407c661cb288f08d67842bc6d21257c1bd61f66af387292380a79ac88cf36eab

  • SSDEEP

    3072:KMy+bnr+O185GWp1icKAArDZz4N9GhbkrNEk656KobmnVgAmhu4mNP9ZiTlYnx:KMy+bnr+fp0yN90QEiKVgWdjimx

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      b17e3f91abc093c2026df4648b096b1993781fb03e4ea1a2b0872a42b04b79bd.exe

    • Size

      202KB

    • MD5

      5c1d57804de9c2890101ec5c34772eba

    • SHA1

      b4fb0bf3d7a76c30f99cdf1916be40ce8874a5f7

    • SHA256

      b17e3f91abc093c2026df4648b096b1993781fb03e4ea1a2b0872a42b04b79bd

    • SHA512

      c074a1d4c8318d0a90b35434618bd38b2f11501ebfca276c131d7d71d9872da4407c661cb288f08d67842bc6d21257c1bd61f66af387292380a79ac88cf36eab

    • SSDEEP

      3072:KMy+bnr+O185GWp1icKAArDZz4N9GhbkrNEk656KobmnVgAmhu4mNP9ZiTlYnx:KMy+bnr+fp0yN90QEiKVgWdjimx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks