General

  • Target

    a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e

  • Size

    11KB

  • Sample

    210822-v2g9xak126

  • MD5

    038bd2ee88ff4c4990fc6328229b7702

  • SHA1

    7c80698a230be3c6733ded3ee7622fe356c3cb7d

  • SHA256

    a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e

  • SHA512

    6dac9efbecbd525129ce56d9f0f620e101afca8e91e23c48b6f377711d3a9b97fac1d38f8de8c57b73e309b57ebaac7bf152b207c166c0a6ce3eac2b49cac03e

Malware Config

Extracted

Family

redline

Botnet

Ayrelia1_installs

C2

77.83.175.169:11490

Targets

    • Target

      a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e

    • Size

      11KB

    • MD5

      038bd2ee88ff4c4990fc6328229b7702

    • SHA1

      7c80698a230be3c6733ded3ee7622fe356c3cb7d

    • SHA256

      a9963528ae516477d9441d7ed9e9b28ea33c055661a8cafa4b6d541e14317e7e

    • SHA512

      6dac9efbecbd525129ce56d9f0f620e101afca8e91e23c48b6f377711d3a9b97fac1d38f8de8c57b73e309b57ebaac7bf152b207c166c0a6ce3eac2b49cac03e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks