General

  • Target

    1b0332f5e16ca53771e891705610b780

  • Size

    532KB

  • Sample

    211218-k2rnraefg4

  • MD5

    1b0332f5e16ca53771e891705610b780

  • SHA1

    b763b9f5c4f189b9ad29913b3eb8ec551dbe41a6

  • SHA256

    74c5701189877d6ff1cee769cfb34bd211feebbd4ad1e03c4f5c609dffe184ac

  • SHA512

    28cdc707438dcd5ab54e7a86e8a96fbaaa072c10eb3e4d24a0535d34206c4d67183521788f5cbc5ab27a7945c55501466cf29d564ad82041204b449b30b0a76b

Malware Config

Extracted

Family

redline

Botnet

test1

C2

212.114.52.221:47868

Targets

    • Target

      1b0332f5e16ca53771e891705610b780

    • Size

      532KB

    • MD5

      1b0332f5e16ca53771e891705610b780

    • SHA1

      b763b9f5c4f189b9ad29913b3eb8ec551dbe41a6

    • SHA256

      74c5701189877d6ff1cee769cfb34bd211feebbd4ad1e03c4f5c609dffe184ac

    • SHA512

      28cdc707438dcd5ab54e7a86e8a96fbaaa072c10eb3e4d24a0535d34206c4d67183521788f5cbc5ab27a7945c55501466cf29d564ad82041204b449b30b0a76b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks