General

  • Target

    usfive_20210923-211555

  • Size

    129KB

  • Sample

    210926-nzesysegbk

  • MD5

    f3ece1fccde488f4b34e2e6d8acf8bc6

  • SHA1

    b2388fd305a16419830d2a1f77bd06aeb163a570

  • SHA256

    7ca61d0c6da0befe6f8dcb57e761d655eaf524c6266425bbf18fcc5a02351f32

  • SHA512

    1433bf9963c9092e93bf16ea565596b9b0878c71bc477de8ab6d1c725c099a00467063339271f82ab151f62377701332e076688abb379215124d9be7b8d73939

Malware Config

Extracted

Family

redline

Botnet

raketa

C2

45.144.29.94:61419

Targets

    • Target

      usfive_20210923-211555

    • Size

      129KB

    • MD5

      f3ece1fccde488f4b34e2e6d8acf8bc6

    • SHA1

      b2388fd305a16419830d2a1f77bd06aeb163a570

    • SHA256

      7ca61d0c6da0befe6f8dcb57e761d655eaf524c6266425bbf18fcc5a02351f32

    • SHA512

      1433bf9963c9092e93bf16ea565596b9b0878c71bc477de8ab6d1c725c099a00467063339271f82ab151f62377701332e076688abb379215124d9be7b8d73939

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks