General

  • Target

    o3cr.exe

  • Size

    270KB

  • Sample

    230505-p5ewksaf56

  • MD5

    403e23c4a6a129c58dcaaaeecc51a7a1

  • SHA1

    b1b7bbf8f6a095c33422ba157a46f6c11753583d

  • SHA256

    0402a4780ff6a5ad2579286301ff602457c242e8ddd90d90bce3eaee8b8f3e92

  • SHA512

    6e4d9ce1d3d627e7c6cb056cf5f9dd805b4924708579a4902fd1c07583651f74ef1b0c3db2da1104a4bb094acbfdc52b5f38d294b31012b3cb1ff9c50aafc4cb

  • SSDEEP

    6144:vVsktNQEngBxHA+fg3v9kKXUQtZK9KkWG/j:vVsEmEgHH23vRUQtgSG/j

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

o3

C2

65.21.133.231:47430

Attributes
  • auth_value

    4f94388048da9aff1b885a942a278195

Targets

    • Target

      o3cr.exe

    • Size

      270KB

    • MD5

      403e23c4a6a129c58dcaaaeecc51a7a1

    • SHA1

      b1b7bbf8f6a095c33422ba157a46f6c11753583d

    • SHA256

      0402a4780ff6a5ad2579286301ff602457c242e8ddd90d90bce3eaee8b8f3e92

    • SHA512

      6e4d9ce1d3d627e7c6cb056cf5f9dd805b4924708579a4902fd1c07583651f74ef1b0c3db2da1104a4bb094acbfdc52b5f38d294b31012b3cb1ff9c50aafc4cb

    • SSDEEP

      6144:vVsktNQEngBxHA+fg3v9kKXUQtZK9KkWG/j:vVsEmEgHH23vRUQtgSG/j

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks