General

  • Target

    de2dd32cbaf5684c416ec5b2b7b01b1f2484298523ce4afb1f2d91fa0f77a8b1

  • Size

    146KB

  • Sample

    221206-b8hvraag9w

  • MD5

    7294ce65f4136f890c265564bfaf66b2

  • SHA1

    c334d43064ba42947dabb2929f0b5c5b3fb37093

  • SHA256

    6a2a8489755e79b86366bba559f07b635ebe6a4c5adc111f00539f2bb8ed8d0c

  • SHA512

    de9f6ac6bc3e8dd17d70c217c825b7387454190e13fa977844c4446635ca1f1d35244ed7bc3b8f76cb3d8b17823302b3a45dfbe1f26c408b8a3ec971627a849b

  • SSDEEP

    3072:QhnKcoQ2OHd7fNzQdeRwyatwgcqTZk5tx79AIrgmG9OFI:Qoco+Hd7fxqe2xcyqtFNx9I

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      de2dd32cbaf5684c416ec5b2b7b01b1f2484298523ce4afb1f2d91fa0f77a8b1

    • Size

      239KB

    • MD5

      e78d8a619f24e1f5d332a16bb556c70a

    • SHA1

      4f1d3998793dbd772dde0394e4c75d92abe7f6e6

    • SHA256

      de2dd32cbaf5684c416ec5b2b7b01b1f2484298523ce4afb1f2d91fa0f77a8b1

    • SHA512

      a76e905c639fe2633f6a315f617d3b5e38246d73a95fa19899b196d811485a96c434f2694003eaf1b28a8c9d81923d2c2419bb0a5859bb3edbef6b25aa6e52d1

    • SSDEEP

      3072:8x+Qgbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcHmwxO:8x+QgWg5Kq+PwQoHp0DoK2KJSTfqrhmz

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks