General

  • Target

    0d52fa8c79bf1d4da433a9b179dce597.exe

  • Size

    602KB

  • Sample

    210825-7hk563kgr6

  • MD5

    0d52fa8c79bf1d4da433a9b179dce597

  • SHA1

    ef030808356b4d042982c357ef9d67560cbc9b6b

  • SHA256

    c786f20d3e96a3c55f01d4c6b63b08f8b45bb4799303a15eaf0086e4d2ae87e6

  • SHA512

    12872958a86345c48095d5c4ddfe9bd453c08cd6b8fd9b415ee2612e63faeea0bc574d02af66ff36209abe6621508916afdd7fd2b9a2d604482ccb624e1926c1

Malware Config

Extracted

Family

redline

Botnet

2021

C2

82.202.161.192:10683

Targets

    • Target

      0d52fa8c79bf1d4da433a9b179dce597.exe

    • Size

      602KB

    • MD5

      0d52fa8c79bf1d4da433a9b179dce597

    • SHA1

      ef030808356b4d042982c357ef9d67560cbc9b6b

    • SHA256

      c786f20d3e96a3c55f01d4c6b63b08f8b45bb4799303a15eaf0086e4d2ae87e6

    • SHA512

      12872958a86345c48095d5c4ddfe9bd453c08cd6b8fd9b415ee2612e63faeea0bc574d02af66ff36209abe6621508916afdd7fd2b9a2d604482ccb624e1926c1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks