General

  • Target

    b5088e71620e86cf712292d9e7a29320f26c58b711217.exe

  • Size

    708KB

  • Sample

    210430-gya24zvvcn

  • MD5

    db874c5199ae1f20b31fc9d419c6da65

  • SHA1

    f670e09bcb0b4e22ca34acccaa73145d23e5113a

  • SHA256

    b5088e71620e86cf712292d9e7a29320f26c58b711217722ed9a500484ceea52

  • SHA512

    b331647a46ac34bdd8b5b78de5037558778e70dc31d9eb8ebc8550bdf6665517695d6ddb45f54079423815466c68797edf3f7302555a136972de613160822175

Malware Config

Extracted

Family

redline

Botnet

BBCbrow

C2

qurernenail.xyz:80

Targets

    • Target

      b5088e71620e86cf712292d9e7a29320f26c58b711217.exe

    • Size

      708KB

    • MD5

      db874c5199ae1f20b31fc9d419c6da65

    • SHA1

      f670e09bcb0b4e22ca34acccaa73145d23e5113a

    • SHA256

      b5088e71620e86cf712292d9e7a29320f26c58b711217722ed9a500484ceea52

    • SHA512

      b331647a46ac34bdd8b5b78de5037558778e70dc31d9eb8ebc8550bdf6665517695d6ddb45f54079423815466c68797edf3f7302555a136972de613160822175

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks