General

  • Target

    9E332E0055D683E9A92ED746F5C1607F.exe

  • Size

    370KB

  • Sample

    210719-5zkt1kf8h2

  • MD5

    9e332e0055d683e9a92ed746f5c1607f

  • SHA1

    5c8083d719ffff06f91d9a34439a4e68424bb72e

  • SHA256

    0a57da60edb393260bde08820ab954d33416b778abf9f2a36627e321079afe2e

  • SHA512

    af9a9722984b11ea093b4c1f65161e643bd0ff7bfb8973147c2fd320eb810198b9bbd5a99811f715a178a71c1b84c8f58010a2a27abb7a83477ae10e0ae40bd1

Malware Config

Extracted

Family

redline

Botnet

pro2

C2

95.217.122.120:8374

Targets

    • Target

      9E332E0055D683E9A92ED746F5C1607F.exe

    • Size

      370KB

    • MD5

      9e332e0055d683e9a92ed746f5c1607f

    • SHA1

      5c8083d719ffff06f91d9a34439a4e68424bb72e

    • SHA256

      0a57da60edb393260bde08820ab954d33416b778abf9f2a36627e321079afe2e

    • SHA512

      af9a9722984b11ea093b4c1f65161e643bd0ff7bfb8973147c2fd320eb810198b9bbd5a99811f715a178a71c1b84c8f58010a2a27abb7a83477ae10e0ae40bd1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks