General

  • Target

    tmp

  • Size

    13.5MB

  • Sample

    230421-xwxn2abd3w

  • MD5

    9f390e9ca00464a6f7e1ce321baceb22

  • SHA1

    d5d813e0bad5c64cd95b23919eba1432778b7965

  • SHA256

    255cb2aeeac6f7dd8359b29b0fbbb02122683894e061b6b305684e396fef85a7

  • SHA512

    54b958487f40537c80374acb37d0cec27bb169fc5549768fb05a161de1a10546cea7c6be1d59df5fb615ed8285f0bf03f33203a1ec0a28fcc6694497e6a6ee2f

  • SSDEEP

    393216:M1xsX4B8eD3F+oI9KtC9I5cfZLxsaZf4nT70mrsMYd:M1GI9FQmOfZLSP0Qc

Malware Config

Extracted

Family

redline

Botnet

5350206221

C2

195.20.17.139:80

Attributes
  • auth_value

    cf75908d75b4508135a38c8679c86f6e

Targets

    • Target

      tmp

    • Size

      13.5MB

    • MD5

      9f390e9ca00464a6f7e1ce321baceb22

    • SHA1

      d5d813e0bad5c64cd95b23919eba1432778b7965

    • SHA256

      255cb2aeeac6f7dd8359b29b0fbbb02122683894e061b6b305684e396fef85a7

    • SHA512

      54b958487f40537c80374acb37d0cec27bb169fc5549768fb05a161de1a10546cea7c6be1d59df5fb615ed8285f0bf03f33203a1ec0a28fcc6694497e6a6ee2f

    • SSDEEP

      393216:M1xsX4B8eD3F+oI9KtC9I5cfZLxsaZf4nT70mrsMYd:M1GI9FQmOfZLSP0Qc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks