General

  • Target

    de2dd32cbaf5684c416ec5b2b7b01b1f2484298523ce4afb1f2d91fa0f77a8b1

  • Size

    146KB

  • Sample

    221206-1t2fzsah7x

  • MD5

    34a441e2637ea1d2be6fb517846796b0

  • SHA1

    597f7871e08c4a0263aec9e02a8c17cae5a8c3a1

  • SHA256

    dac887268ae32c5c139769099c668175394d9120ea7bfed9674cdecf993dd195

  • SHA512

    f60c46b65abdad53fe7d4916349f3d88a51202c3cbf14aeb5a92e707d8e0cd1f937f5a1fb8726aefcfcaa6de20a57e489247d76af7fe39a673d5767174d1750f

  • SSDEEP

    3072:lhnKcoQ2OHd7fNzQdeRwyatwgcqTZk5tx79AIrgmG9OFb:loco+Hd7fxqe2xcyqtFNx9b

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      de2dd32cbaf5684c416ec5b2b7b01b1f2484298523ce4afb1f2d91fa0f77a8b1

    • Size

      239KB

    • MD5

      e78d8a619f24e1f5d332a16bb556c70a

    • SHA1

      4f1d3998793dbd772dde0394e4c75d92abe7f6e6

    • SHA256

      de2dd32cbaf5684c416ec5b2b7b01b1f2484298523ce4afb1f2d91fa0f77a8b1

    • SHA512

      a76e905c639fe2633f6a315f617d3b5e38246d73a95fa19899b196d811485a96c434f2694003eaf1b28a8c9d81923d2c2419bb0a5859bb3edbef6b25aa6e52d1

    • SSDEEP

      3072:8x+Qgbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcHmwxO:8x+QgWg5Kq+PwQoHp0DoK2KJSTfqrhmz

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks