General

  • Target

    097801f0775cebf4636748c142b73e2007c8f5b4013a295588361355e0946567

  • Size

    2.4MB

  • Sample

    221101-j86ktaaebk

  • MD5

    498439e04b8910a83efa090fc5cab860

  • SHA1

    fb00f73b123b39e0afe513252b02294ac88ec23e

  • SHA256

    097801f0775cebf4636748c142b73e2007c8f5b4013a295588361355e0946567

  • SHA512

    5762c3af49b34d56c121855422a03d021c86d0708e7d0ba3b866d3978ef06fc973142459fda305f2b0d016777595bb613bd8bc7e1c0cecdf4328d7cbed6c1149

  • SSDEEP

    24576:sbtIOSYgYszi9a1MfBo6erYVt16pG5AB0Pv+CUr9mJSBILa0daD/zsl3RuQ5531U:s5IJh/G5ACn+CUrgJSBI+0dll3a

Malware Config

Extracted

Family

redline

Botnet

@gentlemen12348

C2

185.106.92.226:40788

Attributes
  • auth_value

    45f4d33a655925bb5f157bbf379d9dd4

Targets

    • Target

      097801f0775cebf4636748c142b73e2007c8f5b4013a295588361355e0946567

    • Size

      2.4MB

    • MD5

      498439e04b8910a83efa090fc5cab860

    • SHA1

      fb00f73b123b39e0afe513252b02294ac88ec23e

    • SHA256

      097801f0775cebf4636748c142b73e2007c8f5b4013a295588361355e0946567

    • SHA512

      5762c3af49b34d56c121855422a03d021c86d0708e7d0ba3b866d3978ef06fc973142459fda305f2b0d016777595bb613bd8bc7e1c0cecdf4328d7cbed6c1149

    • SSDEEP

      24576:sbtIOSYgYszi9a1MfBo6erYVt16pG5AB0Pv+CUr9mJSBILa0daD/zsl3RuQ5531U:s5IJh/G5ACn+CUrgJSBI+0dll3a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks