General

  • Target

    4a1283a4a265030f72e946f7852501945b8ea0c4788d369d4c3354eedebc8b6f

  • Size

    1.4MB

  • Sample

    231031-wfqecaca4v

  • MD5

    93f5bde2f4546441b4688e7abbfe8d75

  • SHA1

    20efe17f6a046ee169cbc0cebb9e88a798abb5ae

  • SHA256

    601e143c91ecf3888c08e88952f8a33a5072be80dd9f683f286ff216e4949f70

  • SHA512

    20aee1a1ad737d0922c0b0f73d80f778334aa798777bae2cee719062c7c8699f91c33972d8e791fd6269bf33b36d205ee39dafe5c01aff829ecd8543e418fb05

  • SSDEEP

    24576:KypvdL5pnn/z5Alsp8BAujzPolPwpFkCiMND2O+4NBv3awGXSGPSHI+D5pEg:RDL5pntIq8BAmPqPwpFkRMNLXNZmXFiF

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      4a1283a4a265030f72e946f7852501945b8ea0c4788d369d4c3354eedebc8b6f

    • Size

      1.5MB

    • MD5

      c629ba55eb36aca092419edad8dd05d3

    • SHA1

      a40b4083f9f4679badecac2665aad149acda5993

    • SHA256

      4a1283a4a265030f72e946f7852501945b8ea0c4788d369d4c3354eedebc8b6f

    • SHA512

      7fd500dff0559756d654a76f8c3fed39e26a10d3dacc348c4be7b526957afa0f7b0426a09a9f0e1b17837c1875f537aeb26db824985145ccbceafcf35178838a

    • SSDEEP

      24576:PytL59nfjzlCsX8HC2NzvUFeCiANRlOI5CBvp6AGXUGTSHIUD51E:atL59foG8HCSvUFeRANRYwCT4XLiIUD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks