General

  • Target

    86ecd72eab486c8b27ed6d79158a120197954e0ab73ef7f0169d5cc9311b0013

  • Size

    239KB

  • Sample

    221205-2ftpnagb8z

  • MD5

    d134e2ba21177362ccdc42d72a7bff14

  • SHA1

    a55db7653e270bdba96f2c557517421a2257b5c3

  • SHA256

    86ecd72eab486c8b27ed6d79158a120197954e0ab73ef7f0169d5cc9311b0013

  • SHA512

    fa02fd50e0436b6d52fea4e0e7b7f67a3f470fe4e5c391e740b4943b38720ded6b726d41b3baa5d059ceef9bc01ef982610aaab3334a8be2599568b657dc4e66

  • SSDEEP

    3072:Nx+Sgbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATc5mfxO:Nx+SgWg5Kq+PwQoHp0DoK2KJSTfqrhmK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      86ecd72eab486c8b27ed6d79158a120197954e0ab73ef7f0169d5cc9311b0013

    • Size

      239KB

    • MD5

      d134e2ba21177362ccdc42d72a7bff14

    • SHA1

      a55db7653e270bdba96f2c557517421a2257b5c3

    • SHA256

      86ecd72eab486c8b27ed6d79158a120197954e0ab73ef7f0169d5cc9311b0013

    • SHA512

      fa02fd50e0436b6d52fea4e0e7b7f67a3f470fe4e5c391e740b4943b38720ded6b726d41b3baa5d059ceef9bc01ef982610aaab3334a8be2599568b657dc4e66

    • SSDEEP

      3072:Nx+Sgbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATc5mfxO:Nx+SgWg5Kq+PwQoHp0DoK2KJSTfqrhmK

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks