General

  • Target

    1fdfd17b811e2b9cd84e7fccfd127cad598355e42bd23b0680f4a89e5d6097cf

  • Size

    277KB

  • Sample

    221205-tc9mpsdh45

  • MD5

    5649b68c3d70fef2a90035ddd991d460

  • SHA1

    87e716a30ac30e4b1496eebea6b7823507e0cb20

  • SHA256

    1fdfd17b811e2b9cd84e7fccfd127cad598355e42bd23b0680f4a89e5d6097cf

  • SHA512

    6ab81f3364fc7cc335d7d716ebfa0c0ef1b4e57ea2173afc7f1a8e9c0a440dafc29f7f1216b44a62a1f6c1af0178fbd5b4e64407dbe1cea4a65938aca64e44ab

  • SSDEEP

    3072:oLjOZXj0I/hH3RvM+4UU5i7SVx/n8p+izFgTWq+DaxO:oLSZXj0I/4nFzP8p+O

Malware Config

Extracted

Family

redline

Botnet

@2023

C2

79.137.192.28:20723

Attributes
  • auth_value

    93b4b7d0dc8e9415e261a402587c6710

Targets

    • Target

      1fdfd17b811e2b9cd84e7fccfd127cad598355e42bd23b0680f4a89e5d6097cf

    • Size

      277KB

    • MD5

      5649b68c3d70fef2a90035ddd991d460

    • SHA1

      87e716a30ac30e4b1496eebea6b7823507e0cb20

    • SHA256

      1fdfd17b811e2b9cd84e7fccfd127cad598355e42bd23b0680f4a89e5d6097cf

    • SHA512

      6ab81f3364fc7cc335d7d716ebfa0c0ef1b4e57ea2173afc7f1a8e9c0a440dafc29f7f1216b44a62a1f6c1af0178fbd5b4e64407dbe1cea4a65938aca64e44ab

    • SSDEEP

      3072:oLjOZXj0I/hH3RvM+4UU5i7SVx/n8p+izFgTWq+DaxO:oLSZXj0I/4nFzP8p+O

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks