General

  • Target

    f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42

  • Size

    239KB

  • Sample

    221205-v35l4sea51

  • MD5

    a008c04a60729fffc6c7662d7a888d36

  • SHA1

    c57e84fac1d7d53657566c200c66169597b310c5

  • SHA256

    f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42

  • SHA512

    a7723ec0bc9c648c8552db951abfe4be657021fbf29773c6e40dca3c0d07ac071ceccd67e1553173233059c7ad2e4b3e7db03d913ccc4b8852a59839bdd2ef0c

  • SSDEEP

    3072:9x+igbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcamXxO:9x+igWg5Kq+PwQoHp0DoK2KJSTfqrhm9

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42

    • Size

      239KB

    • MD5

      a008c04a60729fffc6c7662d7a888d36

    • SHA1

      c57e84fac1d7d53657566c200c66169597b310c5

    • SHA256

      f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42

    • SHA512

      a7723ec0bc9c648c8552db951abfe4be657021fbf29773c6e40dca3c0d07ac071ceccd67e1553173233059c7ad2e4b3e7db03d913ccc4b8852a59839bdd2ef0c

    • SSDEEP

      3072:9x+igbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcamXxO:9x+igWg5Kq+PwQoHp0DoK2KJSTfqrhm9

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks