General

  • Target

    ea9afab0e8cc64a2429bf1e021bea71dda6ed8674e0f771297425f70fd329c58

  • Size

    220KB

  • Sample

    221204-f8qyksfa3x

  • MD5

    a1ca57371deb78f10be0bcb6b43769a6

  • SHA1

    bc922a56246547ad6a3cc39b765be4b3cdf384cb

  • SHA256

    ea9afab0e8cc64a2429bf1e021bea71dda6ed8674e0f771297425f70fd329c58

  • SHA512

    9d9a8b9710efcbc9f141ec4870ddd62d5e8b62399bdc3ed5a8fd046217e23f2c91c1bc915781df22b249d1df62c78c6d23e7c9cb28b8abf141bf1a8a91b83384

  • SSDEEP

    3072:cLxc5JmmhFzW0qu7b4ee8fwmGzPMWxS+bsqLCX3knb95IcWdXCY9bTAINzXdcxO:cLxc5JmmTNveMwTDM4RVCkbSCY9ZN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      ea9afab0e8cc64a2429bf1e021bea71dda6ed8674e0f771297425f70fd329c58

    • Size

      220KB

    • MD5

      a1ca57371deb78f10be0bcb6b43769a6

    • SHA1

      bc922a56246547ad6a3cc39b765be4b3cdf384cb

    • SHA256

      ea9afab0e8cc64a2429bf1e021bea71dda6ed8674e0f771297425f70fd329c58

    • SHA512

      9d9a8b9710efcbc9f141ec4870ddd62d5e8b62399bdc3ed5a8fd046217e23f2c91c1bc915781df22b249d1df62c78c6d23e7c9cb28b8abf141bf1a8a91b83384

    • SSDEEP

      3072:cLxc5JmmhFzW0qu7b4ee8fwmGzPMWxS+bsqLCX3knb95IcWdXCY9bTAINzXdcxO:cLxc5JmmTNveMwTDM4RVCkbSCY9ZN

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks