General

  • Target

    2dda8ea82d17f6ea835d74b5fc0fede7c5f295d996629b861e7350aea2e7b32a

  • Size

    1.1MB

  • Sample

    231002-rrbccabe3t

  • MD5

    c162bce4a93d3132b3d4147d76413bd6

  • SHA1

    e814e2734317252b4eaff30d6e5936de430d4bde

  • SHA256

    2dda8ea82d17f6ea835d74b5fc0fede7c5f295d996629b861e7350aea2e7b32a

  • SHA512

    57c133fcca8753f0549f47b0ce6b747fc2d5f522eb993cfde53049d33105cffc2f0db0f4a3b83060171a683d2fd53624f08702f85f2023bc974d9ea34864ab16

  • SSDEEP

    24576:gygTwY0vn185PZRMDGAGB0r/6srNeV6+V4:nVq5PzF5RONe4+

Malware Config

Extracted

Family

redline

Botnet

larek

C2

77.91.124.55:19071

Targets

    • Target

      2dda8ea82d17f6ea835d74b5fc0fede7c5f295d996629b861e7350aea2e7b32a

    • Size

      1.1MB

    • MD5

      c162bce4a93d3132b3d4147d76413bd6

    • SHA1

      e814e2734317252b4eaff30d6e5936de430d4bde

    • SHA256

      2dda8ea82d17f6ea835d74b5fc0fede7c5f295d996629b861e7350aea2e7b32a

    • SHA512

      57c133fcca8753f0549f47b0ce6b747fc2d5f522eb993cfde53049d33105cffc2f0db0f4a3b83060171a683d2fd53624f08702f85f2023bc974d9ea34864ab16

    • SSDEEP

      24576:gygTwY0vn185PZRMDGAGB0r/6srNeV6+V4:nVq5PzF5RONe4+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks