General

  • Target

    0bfe958b9380da04be2722f96abfa7bf0d7561401a528865e297a7b2edbb852c

  • Size

    1.5MB

  • Sample

    231030-d2t1jscd25

  • MD5

    b3015fd8b27e2f47b38c8efdf41fc031

  • SHA1

    bf7891af166728cac6aabc68b836a29f97ffc253

  • SHA256

    0bfe958b9380da04be2722f96abfa7bf0d7561401a528865e297a7b2edbb852c

  • SHA512

    f8ef1f0b5ffba1d162b7b2e8ea374c651ef85ed2b122775b570ea355d1f730a98f3bc251f5165fb13663f0c5522c7c7e646700c03be817f8c7234b440c427542

  • SSDEEP

    24576:Syelj60Gze+aOFpoAtG/FyCiACpmEWXL4Z+Qg2E/mPdPt0TxlnRP/UyK258jSbUQ:5IjGFppYMxWMM/mP5ennRPvKjSY

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      0bfe958b9380da04be2722f96abfa7bf0d7561401a528865e297a7b2edbb852c

    • Size

      1.5MB

    • MD5

      b3015fd8b27e2f47b38c8efdf41fc031

    • SHA1

      bf7891af166728cac6aabc68b836a29f97ffc253

    • SHA256

      0bfe958b9380da04be2722f96abfa7bf0d7561401a528865e297a7b2edbb852c

    • SHA512

      f8ef1f0b5ffba1d162b7b2e8ea374c651ef85ed2b122775b570ea355d1f730a98f3bc251f5165fb13663f0c5522c7c7e646700c03be817f8c7234b440c427542

    • SSDEEP

      24576:Syelj60Gze+aOFpoAtG/FyCiACpmEWXL4Z+Qg2E/mPdPt0TxlnRP/UyK258jSbUQ:5IjGFppYMxWMM/mP5ennRPvKjSY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks