General

  • Target

    157ceeadff718208967276f9585aa071d5f81525674a8270ac9d1da4174ba1d2

  • Size

    1.0MB

  • Sample

    231003-jyflmshc2z

  • MD5

    915cda027a562d751b0401e9f1277a8c

  • SHA1

    655bce7bedce69eb60624a462f9081691480015f

  • SHA256

    a1acca3c56106769e8b90373baa9c98730318e0a42e92da452ed7d618ba712d7

  • SHA512

    b5e5bd4ad16415d18b2da8dec8b618680dc46f1abe80bb8dda219ef47845bb304bfdb4a9560f76c88f2f2dda8f93238812d014a994ed9f0f5db69cd129bf74ea

  • SSDEEP

    24576:DyYYtjOiowZXPQW1+vltl1rMe61edHEUcAsevtwqtQdG3oAO:WYYtBZfQWwtvgoH8EtXQdGYR

Malware Config

Extracted

Family

redline

Botnet

larek

C2

77.91.124.55:19071

Targets

    • Target

      157ceeadff718208967276f9585aa071d5f81525674a8270ac9d1da4174ba1d2

    • Size

      1.1MB

    • MD5

      33a2bde6b4924ed18b062deadea58829

    • SHA1

      8cfbf74e4e5bc2a661af53e7aa35db8cbbace483

    • SHA256

      157ceeadff718208967276f9585aa071d5f81525674a8270ac9d1da4174ba1d2

    • SHA512

      952aac816dfb6ae09ead9b9c88e8851eccfaeeffaa22ccaf168d201b3ea120e0d177afc0b10684df335122cd2416833d257361527ef8e189059c89f14ed20569

    • SSDEEP

      24576:SykPiDowZFhQWT+ZRvl3rOw6q+dHWyZacmsOEqTQBGwAH:5eGZvQWcv5iqqHWyZZOtQBGw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks