General

  • Target

    e2cb8407436a5a2ed6f1220df5805900cf1df475eb9493a81508e61748144e1e

  • Size

    244KB

  • Sample

    221112-abgqrafe5s

  • MD5

    7b41368bae47e4e02a054fad1155da9b

  • SHA1

    210cb9b322dc316f25b1c614af26174eb7dceda1

  • SHA256

    e2cb8407436a5a2ed6f1220df5805900cf1df475eb9493a81508e61748144e1e

  • SHA512

    525c76bd414657480f7f543326c13d7c84149cb8f172d10039de3ce66751cb1afc04b7d5b374b917405401f54883e594cb52e29f34a521debdfb959a71eded6f

  • SSDEEP

    6144:PUmnhkRWlYBmwedJWh3FO9F9JCm7Xyn2APRNXyJ0yiwMREUxL0w4bJsEy:LnhkRWvWh3FO9F9JCm7Xyn2APbXymwM5

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      e2cb8407436a5a2ed6f1220df5805900cf1df475eb9493a81508e61748144e1e

    • Size

      244KB

    • MD5

      7b41368bae47e4e02a054fad1155da9b

    • SHA1

      210cb9b322dc316f25b1c614af26174eb7dceda1

    • SHA256

      e2cb8407436a5a2ed6f1220df5805900cf1df475eb9493a81508e61748144e1e

    • SHA512

      525c76bd414657480f7f543326c13d7c84149cb8f172d10039de3ce66751cb1afc04b7d5b374b917405401f54883e594cb52e29f34a521debdfb959a71eded6f

    • SSDEEP

      6144:PUmnhkRWlYBmwedJWh3FO9F9JCm7Xyn2APRNXyJ0yiwMREUxL0w4bJsEy:LnhkRWvWh3FO9F9JCm7Xyn2APbXymwM5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks