General

  • Target

    f80976fedfa4baa6cc2dc28b3072ff2e0ea67bc7067dde08de7f1ebb20d09f7c

  • Size

    1.7MB

  • Sample

    231023-z5yzkafg6t

  • MD5

    b3248ee1e5f789ecd4ddb320aa58c6b4

  • SHA1

    c3f621bac81563702565987457030287de79a412

  • SHA256

    f80976fedfa4baa6cc2dc28b3072ff2e0ea67bc7067dde08de7f1ebb20d09f7c

  • SHA512

    2e46e10216421a73007b6de8d10c737b80fee9cd5b3cf52896b08989e32862785130c1018ce4488b994be57ccbebbcf1bb44738d6bb8f8bc2ba09ae66e93a07f

  • SSDEEP

    49152:LxLlHqRV1o8KdXp3zz3I4n/oNNkOSv5CsDognTJ:NLcwtJ3vgNNtSRCsNnV

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      f80976fedfa4baa6cc2dc28b3072ff2e0ea67bc7067dde08de7f1ebb20d09f7c

    • Size

      1.7MB

    • MD5

      b3248ee1e5f789ecd4ddb320aa58c6b4

    • SHA1

      c3f621bac81563702565987457030287de79a412

    • SHA256

      f80976fedfa4baa6cc2dc28b3072ff2e0ea67bc7067dde08de7f1ebb20d09f7c

    • SHA512

      2e46e10216421a73007b6de8d10c737b80fee9cd5b3cf52896b08989e32862785130c1018ce4488b994be57ccbebbcf1bb44738d6bb8f8bc2ba09ae66e93a07f

    • SSDEEP

      49152:LxLlHqRV1o8KdXp3zz3I4n/oNNkOSv5CsDognTJ:NLcwtJ3vgNNtSRCsNnV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks