General

  • Target

    d9925e74f50cd559147ca8c2da977ebdef529eb5db8171e7d0a9699672f2c37c

  • Size

    1.4MB

  • Sample

    231031-qfm2bsgb8z

  • MD5

    7c6f4df4491205e3b445557f9a9186c4

  • SHA1

    6a1b4f8015838519e6382c94b578eaa759dd69c2

  • SHA256

    4eda9217fc5197997667c66dfe6bba0797650122460982d9379d2ab98a808c40

  • SHA512

    7384976d19baa84ff77593d486ded133ddba97e5dd795068ea74594553b28813ea4708d873d9b7b1cc186cc35eb503eced05a67f246166438326c0c6d7707fb1

  • SSDEEP

    24576:U7w9vy1jm5+/mhRQI6/x/XpkN39HcQeT9gdMQbsbbFCsc6RO/TeG5PTF94Co6QD:UEkJAkRxPWN7QDb4sjO/TeCPx94C9QD

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      d9925e74f50cd559147ca8c2da977ebdef529eb5db8171e7d0a9699672f2c37c

    • Size

      1.4MB

    • MD5

      a605f8f4c7ce38ec69a0862c8fdc44ac

    • SHA1

      837b13a1a1381b8169f8c7bdd42237b3463a89f4

    • SHA256

      d9925e74f50cd559147ca8c2da977ebdef529eb5db8171e7d0a9699672f2c37c

    • SHA512

      7700687987e8ece6b8d875715fe39369e32e08cd392c8ae413e02078be51decf68c7b9eadbd34c1d204ba746b4ecf50a5ffa1ca29e4de7cdaab88f6b53f40063

    • SSDEEP

      24576:TyHzml+Ry3HqI63H2B3kb/3cQCysdGQb6b3BCsuXRODTSe5HTJp48ocB:mTAa1QUBCobQs0ODTSqHNp48

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks