General

  • Target

    f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42

  • Size

    146KB

  • Sample

    221205-y3l2jscf78

  • MD5

    adf344467db38f1361b53761d73fa270

  • SHA1

    215212a945550ed179734773a1e4227683fe3d65

  • SHA256

    a7aba2db90b84d70d75e86732de6db991255fe23ed3c07ea07a5cf136138f053

  • SHA512

    a795d8b5d43c044d4ad91e60e317440b9a622b7d94e95312916782882f961186b801a38f96061293a536f6242b4a63b09491c276a2a9b4239286dd85b21639fe

  • SSDEEP

    3072:ZLZvaYNbZ/Ww5xvVseSLftoQBy6Vo1KsA8xtgpkIxx2iINF0SJz:lZaYxMyxv/oFoZ1jzGx0bF0Ez

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42

    • Size

      239KB

    • MD5

      a008c04a60729fffc6c7662d7a888d36

    • SHA1

      c57e84fac1d7d53657566c200c66169597b310c5

    • SHA256

      f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42

    • SHA512

      a7723ec0bc9c648c8552db951abfe4be657021fbf29773c6e40dca3c0d07ac071ceccd67e1553173233059c7ad2e4b3e7db03d913ccc4b8852a59839bdd2ef0c

    • SSDEEP

      3072:9x+igbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcamXxO:9x+igWg5Kq+PwQoHp0DoK2KJSTfqrhm9

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks