General

  • Target

    86ecd72eab486c8b27ed6d79158a120197954e0ab73ef7f0169d5cc9311b0013

  • Size

    146KB

  • Sample

    221206-xehhsadc96

  • MD5

    5b0775638a8fed792e469de1740da835

  • SHA1

    c72cb4631ae9275d58064028be780224f73cb91f

  • SHA256

    989ca565eb48b0a9063fdd9ca8ac1e72fdce6863d8301f716250ac7f492f2a05

  • SHA512

    35e45f5ee104d16e756c593d46aa87268340a4b137e96be7dc4b7c81ee7a61815ca4ef816c097791e3d54e73a86680b03a76fb93b21a3d47f9fae0871456a960

  • SSDEEP

    3072:s9juvLdcI1x3cJ3jNdw+bZqNtXb+lg3AYRHj/A:yomInsJ3Z2+WP3TJ4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      86ecd72eab486c8b27ed6d79158a120197954e0ab73ef7f0169d5cc9311b0013

    • Size

      239KB

    • MD5

      d134e2ba21177362ccdc42d72a7bff14

    • SHA1

      a55db7653e270bdba96f2c557517421a2257b5c3

    • SHA256

      86ecd72eab486c8b27ed6d79158a120197954e0ab73ef7f0169d5cc9311b0013

    • SHA512

      fa02fd50e0436b6d52fea4e0e7b7f67a3f470fe4e5c391e740b4943b38720ded6b726d41b3baa5d059ceef9bc01ef982610aaab3334a8be2599568b657dc4e66

    • SSDEEP

      3072:Nx+Sgbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATc5mfxO:Nx+SgWg5Kq+PwQoHp0DoK2KJSTfqrhmK

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks