General

  • Target

    046259b62c871362f75d40b9ae5838771b1e6ebc615d59717b1e22148a14372a

  • Size

    239KB

  • Sample

    221205-wssp8sgb4w

  • MD5

    d0916159b4174ac7105a16d0b2569903

  • SHA1

    1a14bf850dcb261757bc4ba01d12e8173535b22f

  • SHA256

    046259b62c871362f75d40b9ae5838771b1e6ebc615d59717b1e22148a14372a

  • SHA512

    19f659a80f915b9b32b00d292410841f57d373b6c0c168c0679925bb862466dee325f47aa902a1ee30a169393dce1806f07765ae7f0ba667473147818bf0f73b

  • SSDEEP

    3072:Zx+Ugbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcjmlxO:Zx+UgWg5Kq+PwQoHp0DoK2KJSTfqrhm2

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      046259b62c871362f75d40b9ae5838771b1e6ebc615d59717b1e22148a14372a

    • Size

      239KB

    • MD5

      d0916159b4174ac7105a16d0b2569903

    • SHA1

      1a14bf850dcb261757bc4ba01d12e8173535b22f

    • SHA256

      046259b62c871362f75d40b9ae5838771b1e6ebc615d59717b1e22148a14372a

    • SHA512

      19f659a80f915b9b32b00d292410841f57d373b6c0c168c0679925bb862466dee325f47aa902a1ee30a169393dce1806f07765ae7f0ba667473147818bf0f73b

    • SSDEEP

      3072:Zx+Ugbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcjmlxO:Zx+UgWg5Kq+PwQoHp0DoK2KJSTfqrhm2

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks