General

  • Target

    be5006a529a06f16a268bdb477d8878b

  • Size

    431KB

  • Sample

    210926-vs48lafbf6

  • MD5

    be5006a529a06f16a268bdb477d8878b

  • SHA1

    7763f470338bf5556cd3f23c3ecababfcd5dd9b1

  • SHA256

    6c2fc47191c17a3bef2060481ca8c058336ad27c731b245212364c132081fc2a

  • SHA512

    1a80b6018c4ff565d3af3c76eca56fa0aa68cebcdb2affc2793dbdfc8d779a90aaf7f79b25b4b8f1918b4e2f43eb7dd47ad30e4ef06dc7126e26831b34cf9cd4

Malware Config

Extracted

Family

redline

Botnet

felix2009

C2

213.166.69.181:64650

Targets

    • Target

      be5006a529a06f16a268bdb477d8878b

    • Size

      431KB

    • MD5

      be5006a529a06f16a268bdb477d8878b

    • SHA1

      7763f470338bf5556cd3f23c3ecababfcd5dd9b1

    • SHA256

      6c2fc47191c17a3bef2060481ca8c058336ad27c731b245212364c132081fc2a

    • SHA512

      1a80b6018c4ff565d3af3c76eca56fa0aa68cebcdb2affc2793dbdfc8d779a90aaf7f79b25b4b8f1918b4e2f43eb7dd47ad30e4ef06dc7126e26831b34cf9cd4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks