General

  • Target

    b5fc67332e05420980a00e2e4da7ebbc

  • Size

    432KB

  • Sample

    210926-tp8k6sfbc5

  • MD5

    b5fc67332e05420980a00e2e4da7ebbc

  • SHA1

    19394812eefe2e09ba724a580a5c89309fef924d

  • SHA256

    a67250f4e3194d603043d506b4bc7c6112bd61a56bf3521e1ee1d95b22a17147

  • SHA512

    36d95a4a4841371604a36740a93edc916786acd87e51c402dd2031f81da5ec704aa35e1bb010d7007f8233c3973a8757a962e3c49d13d091b87a3384239e7aa7

Malware Config

Extracted

Family

redline

Botnet

lyla2109

C2

213.166.69.181:64650

Targets

    • Target

      b5fc67332e05420980a00e2e4da7ebbc

    • Size

      432KB

    • MD5

      b5fc67332e05420980a00e2e4da7ebbc

    • SHA1

      19394812eefe2e09ba724a580a5c89309fef924d

    • SHA256

      a67250f4e3194d603043d506b4bc7c6112bd61a56bf3521e1ee1d95b22a17147

    • SHA512

      36d95a4a4841371604a36740a93edc916786acd87e51c402dd2031f81da5ec704aa35e1bb010d7007f8233c3973a8757a962e3c49d13d091b87a3384239e7aa7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks