General

  • Target

    4c7be05c650723ebc0adab93ee057ddfc5c15ca8629319351029db60adc2323a

  • Size

    755KB

  • Sample

    211213-zg8h4afddj

  • MD5

    5b0174cc725e35f4b323886f19a57a53

  • SHA1

    3e32206206d336dfe98a4b0f6dc90f1276163dc9

  • SHA256

    4c7be05c650723ebc0adab93ee057ddfc5c15ca8629319351029db60adc2323a

  • SHA512

    1a181fdb39e7aaa8b24c015ce1d0404f788142c5894af7e6a2b28bcc41bcde39f8035c797f11c7b756ef27978237bf75fe0ba8b47dea13ec6b4b7d9e4d17f016

Malware Config

Extracted

Family

redline

Botnet

xxluchxx1

C2

212.86.102.63:62907

Targets

    • Target

      4c7be05c650723ebc0adab93ee057ddfc5c15ca8629319351029db60adc2323a

    • Size

      755KB

    • MD5

      5b0174cc725e35f4b323886f19a57a53

    • SHA1

      3e32206206d336dfe98a4b0f6dc90f1276163dc9

    • SHA256

      4c7be05c650723ebc0adab93ee057ddfc5c15ca8629319351029db60adc2323a

    • SHA512

      1a181fdb39e7aaa8b24c015ce1d0404f788142c5894af7e6a2b28bcc41bcde39f8035c797f11c7b756ef27978237bf75fe0ba8b47dea13ec6b4b7d9e4d17f016

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks