General

  • Target

    a0f3803896b70faa31752d13f500ebc8297a0bb58674a443115d88c71690808c_JC.exe

  • Size

    1.0MB

  • Sample

    231011-ndmlnsba7w

  • MD5

    fd2cddccd9a0d7a1f253aad00c673948

  • SHA1

    7110b3ce33053a40480e624ccd1f33d030aafef2

  • SHA256

    a0f3803896b70faa31752d13f500ebc8297a0bb58674a443115d88c71690808c

  • SHA512

    27ce9abb8bc5d7e14f9a564f988f03332709369735d7de7d722e686841d3d7df4ba94fef39089a322597f2c98a4cd540683e35ca3d0ea964ce105e1b05fe0de8

  • SSDEEP

    24576:vgXXnSa1ezkPLyUgINbUk+4KnqdDR/PEqFb90V:v3a1ezkPvfdMOF/R19Y

Score
10/10

Malware Config

Extracted

Family

redline

C2

62.84.98.14:8599

Attributes
  • auth_value

    6a433a8fd414b78014330614e2255e27

Targets

    • Target

      a0f3803896b70faa31752d13f500ebc8297a0bb58674a443115d88c71690808c_JC.exe

    • Size

      1.0MB

    • MD5

      fd2cddccd9a0d7a1f253aad00c673948

    • SHA1

      7110b3ce33053a40480e624ccd1f33d030aafef2

    • SHA256

      a0f3803896b70faa31752d13f500ebc8297a0bb58674a443115d88c71690808c

    • SHA512

      27ce9abb8bc5d7e14f9a564f988f03332709369735d7de7d722e686841d3d7df4ba94fef39089a322597f2c98a4cd540683e35ca3d0ea964ce105e1b05fe0de8

    • SSDEEP

      24576:vgXXnSa1ezkPLyUgINbUk+4KnqdDR/PEqFb90V:v3a1ezkPvfdMOF/R19Y

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks