General

  • Target

    d11db9c62a8150cb6a0188780f503f80

  • Size

    290KB

  • Sample

    220714-jstlbagda9

  • MD5

    d11db9c62a8150cb6a0188780f503f80

  • SHA1

    bfd83c761dfd1f04cce0d25ba115c7ac698d04a2

  • SHA256

    fc456589093a8fa62517604f46722a2696ff4104b4828f55b40e26985fdca24d

  • SHA512

    2027dea5192396a0a319772f2b4abc7a468366e91eb92241b2940f005d10f67786cc5c28aa7c64975f30c30c8380e0ed98ca847c77537ef31916fa639b3adee9

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

76

C2

139.99.32.83:43199

Attributes
  • auth_value

    44d461325298129ed3c705440f57962c

Targets

    • Target

      d11db9c62a8150cb6a0188780f503f80

    • Size

      290KB

    • MD5

      d11db9c62a8150cb6a0188780f503f80

    • SHA1

      bfd83c761dfd1f04cce0d25ba115c7ac698d04a2

    • SHA256

      fc456589093a8fa62517604f46722a2696ff4104b4828f55b40e26985fdca24d

    • SHA512

      2027dea5192396a0a319772f2b4abc7a468366e91eb92241b2940f005d10f67786cc5c28aa7c64975f30c30c8380e0ed98ca847c77537ef31916fa639b3adee9

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks