General

  • Target

    d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa

  • Size

    277KB

  • Sample

    221206-dlfg8acc6v

  • MD5

    fa9ff279393b97cb702111128534c6fa

  • SHA1

    ff78456dfc73487a87d9adb283bd0c9ea18ca085

  • SHA256

    d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa

  • SHA512

    1cf25cca4653474ae4b5fd55c48999d2022c180db20f104db0539fa9832ea4e2528d8de0b66f56f8679a776037f9a795adde7743cf09418821b89dd53fe9959f

  • SSDEEP

    3072:7LjOZXj0I/hH3RvM+4UU5i7SVx/n8p+izFgTWU+qxO:7LSZXj0I/4nFzP8p+4

Malware Config

Extracted

Family

redline

Botnet

@2023

C2

79.137.192.28:20723

Attributes
  • auth_value

    93b4b7d0dc8e9415e261a402587c6710

Targets

    • Target

      d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa

    • Size

      277KB

    • MD5

      fa9ff279393b97cb702111128534c6fa

    • SHA1

      ff78456dfc73487a87d9adb283bd0c9ea18ca085

    • SHA256

      d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa

    • SHA512

      1cf25cca4653474ae4b5fd55c48999d2022c180db20f104db0539fa9832ea4e2528d8de0b66f56f8679a776037f9a795adde7743cf09418821b89dd53fe9959f

    • SSDEEP

      3072:7LjOZXj0I/hH3RvM+4UU5i7SVx/n8p+izFgTWU+qxO:7LSZXj0I/4nFzP8p+4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks