General

  • Target

    c181ef220de67dfc4cce15a689729f1932b037b94276b1ed0bce992c3cb78f99

  • Size

    1.1MB

  • Sample

    231002-tjxayseb65

  • MD5

    896fd0b3c6113c6e223dfb3cb6c310a3

  • SHA1

    896c835c3d3191825a2174edb5767b2b42268fd3

  • SHA256

    c181ef220de67dfc4cce15a689729f1932b037b94276b1ed0bce992c3cb78f99

  • SHA512

    cedc214e685036b03604c02ab478da2865c4357a216dea7e9271526ea2de532d5955be99e7b440a10740f9c004b7f080f835ae4e87dc6fdfe10fb1961cd73b08

  • SSDEEP

    24576:+yIQqE8rpD8ruyHLOzBilaaRonvPRXO9BuW96qk:N5E8zHoil1mvPA9BuWM

Malware Config

Extracted

Family

redline

Botnet

larek

C2

77.91.124.55:19071

Targets

    • Target

      c181ef220de67dfc4cce15a689729f1932b037b94276b1ed0bce992c3cb78f99

    • Size

      1.1MB

    • MD5

      896fd0b3c6113c6e223dfb3cb6c310a3

    • SHA1

      896c835c3d3191825a2174edb5767b2b42268fd3

    • SHA256

      c181ef220de67dfc4cce15a689729f1932b037b94276b1ed0bce992c3cb78f99

    • SHA512

      cedc214e685036b03604c02ab478da2865c4357a216dea7e9271526ea2de532d5955be99e7b440a10740f9c004b7f080f835ae4e87dc6fdfe10fb1961cd73b08

    • SSDEEP

      24576:+yIQqE8rpD8ruyHLOzBilaaRonvPRXO9BuW96qk:N5E8zHoil1mvPA9BuWM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks