General

  • Target

    60e545ef4ab879208c03346db3f7112fbdf39577ccd0b8347708cb88004709a1

  • Size

    828KB

  • Sample

    220730-2t3vgscffr

  • MD5

    3bbd87f7dc3749537ac8ff6c44535ca5

  • SHA1

    184f6aaba0d774d27497659b1188c9eee7644b77

  • SHA256

    60e545ef4ab879208c03346db3f7112fbdf39577ccd0b8347708cb88004709a1

  • SHA512

    dea7d2f455de9a3806ca72a9ca617175c290c9ccd7d27f82f940359b4eceb299e05dbe0401033081ab6ec1932cefbed55f6aa257aeb609d7b1874364d5bb1c93

Malware Config

Extracted

Family

redline

Botnet

white

C2

whitegarden.top:80

Targets

    • Target

      60e545ef4ab879208c03346db3f7112fbdf39577ccd0b8347708cb88004709a1

    • Size

      828KB

    • MD5

      3bbd87f7dc3749537ac8ff6c44535ca5

    • SHA1

      184f6aaba0d774d27497659b1188c9eee7644b77

    • SHA256

      60e545ef4ab879208c03346db3f7112fbdf39577ccd0b8347708cb88004709a1

    • SHA512

      dea7d2f455de9a3806ca72a9ca617175c290c9ccd7d27f82f940359b4eceb299e05dbe0401033081ab6ec1932cefbed55f6aa257aeb609d7b1874364d5bb1c93

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks