General

  • Target

    3cea532b27df8e66718e280a07427f689301e9b38a28111f56e6f122c35feea5

  • Size

    2.4MB

  • Sample

    221101-k25wdaaah4

  • MD5

    b14b3b8053fccbae397fe996ff0195c6

  • SHA1

    b26fc8b4657a007187a8e3eba68edd2b2a2bdd25

  • SHA256

    3cea532b27df8e66718e280a07427f689301e9b38a28111f56e6f122c35feea5

  • SHA512

    8673dd05b57a94525aa9c1c6cf4fb2c785f0d6ee41b0dfbc75a7a7262f3d3383be711df95230941166df6d68de9a6d0b4fde09ce1519de63daa3a357b7c65428

  • SSDEEP

    24576:3Q2K8a1wY/YrBebBYM7NlZ8fBsDp2O2so7+lNwxsi1GlL6LzuAl3RuQ55313v:3lac4dVoGNksi1Glyl3l

Malware Config

Extracted

Family

redline

Botnet

5579878783

C2

193.124.22.27:8362

Targets

    • Target

      3cea532b27df8e66718e280a07427f689301e9b38a28111f56e6f122c35feea5

    • Size

      2.4MB

    • MD5

      b14b3b8053fccbae397fe996ff0195c6

    • SHA1

      b26fc8b4657a007187a8e3eba68edd2b2a2bdd25

    • SHA256

      3cea532b27df8e66718e280a07427f689301e9b38a28111f56e6f122c35feea5

    • SHA512

      8673dd05b57a94525aa9c1c6cf4fb2c785f0d6ee41b0dfbc75a7a7262f3d3383be711df95230941166df6d68de9a6d0b4fde09ce1519de63daa3a357b7c65428

    • SSDEEP

      24576:3Q2K8a1wY/YrBebBYM7NlZ8fBsDp2O2so7+lNwxsi1GlL6LzuAl3RuQ55313v:3lac4dVoGNksi1Glyl3l

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks