General

  • Target

    fdf9ce95cb58f6336d24ef4994467679e17256618efb1f68b03bf1b67b8d2ded

  • Size

    239KB

  • Sample

    221205-1dw7bsce5y

  • MD5

    238406581cfaf6850a7cfc8b63c34bc0

  • SHA1

    eb0f3d46b00cfe38be9a2d3fcea4d74fcc61d076

  • SHA256

    fdf9ce95cb58f6336d24ef4994467679e17256618efb1f68b03bf1b67b8d2ded

  • SHA512

    6b4134ff806a2fba2023d0db57881a63191170be8ca7b07b1ebf46ca171ed6b5d1294fa0a4cf7342325cb3394bbe84aef156fe98e9a408bd14a2da1c356b79e0

  • SSDEEP

    3072:3x+Ggbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATc5mWxO:3x+GgWg5Kq+PwQoHp0DoK2KJSTfqrhmb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      fdf9ce95cb58f6336d24ef4994467679e17256618efb1f68b03bf1b67b8d2ded

    • Size

      239KB

    • MD5

      238406581cfaf6850a7cfc8b63c34bc0

    • SHA1

      eb0f3d46b00cfe38be9a2d3fcea4d74fcc61d076

    • SHA256

      fdf9ce95cb58f6336d24ef4994467679e17256618efb1f68b03bf1b67b8d2ded

    • SHA512

      6b4134ff806a2fba2023d0db57881a63191170be8ca7b07b1ebf46ca171ed6b5d1294fa0a4cf7342325cb3394bbe84aef156fe98e9a408bd14a2da1c356b79e0

    • SSDEEP

      3072:3x+Ggbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATc5mWxO:3x+GgWg5Kq+PwQoHp0DoK2KJSTfqrhmb

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks