General

  • Target

    7bee57f9b847de271f526f9bca03cab459b7f51aec5e740587fa93fbb72fa4e9

  • Size

    378KB

  • Sample

    221028-tabb5agac3

  • MD5

    e559ba3b753e3436067d4c3dbd262670

  • SHA1

    4594839861a5ed4ef2f2661918fb6d947d28ae8f

  • SHA256

    7bee57f9b847de271f526f9bca03cab459b7f51aec5e740587fa93fbb72fa4e9

  • SHA512

    416795728176cab9174feb62f4cbfa0c2817272f18c5929af8c280fca7376d0ce600872c456a5207005fd0e4a9f2206eed7565d3719175355861ddffba59429b

  • SSDEEP

    6144:PV5Yqofb+ddlop89eqJQJPLP/6Tv/3lysmSgy:PV5Y3fb+dnU89eqJQhLP/6Tv/3lysmSg

Malware Config

Extracted

Family

redline

Botnet

DomAni

C2

ergerr3.top:80

Targets

    • Target

      7bee57f9b847de271f526f9bca03cab459b7f51aec5e740587fa93fbb72fa4e9

    • Size

      378KB

    • MD5

      e559ba3b753e3436067d4c3dbd262670

    • SHA1

      4594839861a5ed4ef2f2661918fb6d947d28ae8f

    • SHA256

      7bee57f9b847de271f526f9bca03cab459b7f51aec5e740587fa93fbb72fa4e9

    • SHA512

      416795728176cab9174feb62f4cbfa0c2817272f18c5929af8c280fca7376d0ce600872c456a5207005fd0e4a9f2206eed7565d3719175355861ddffba59429b

    • SSDEEP

      6144:PV5Yqofb+ddlop89eqJQJPLP/6Tv/3lysmSgy:PV5Y3fb+dnU89eqJQhLP/6Tv/3lysmSg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks