General

  • Target

    1b0e5847f75b8b3777be352bfab786cfb5c412d83f77d9470c830d42596d3cbd

  • Size

    1.1MB

  • Sample

    231101-rrzpyahh7z

  • MD5

    bd86d5159f0c071e2fa04f6f6c3ced11

  • SHA1

    2e68404b707ecc7566c737e050c6071a8f65e2ed

  • SHA256

    1b0e5847f75b8b3777be352bfab786cfb5c412d83f77d9470c830d42596d3cbd

  • SHA512

    2e9442161fdada893dcda54a99299ea224c2ec262bd2012e37db6643d45860e7151332b79b348d10ce1b6c0bc5357f393874e16e0cc3caea19030cc0f01b0e4b

  • SSDEEP

    12288:cC9QZgYxMa29AS087kHCqZ+bwRO7bUjkgkruWSOHwWEQiii8VPfEw/TziDQIRyKK:ct+Yd29AX87kHCMVROfuhQiiiuPGI

Malware Config

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Targets

    • Target

      1b0e5847f75b8b3777be352bfab786cfb5c412d83f77d9470c830d42596d3cbd

    • Size

      1.1MB

    • MD5

      bd86d5159f0c071e2fa04f6f6c3ced11

    • SHA1

      2e68404b707ecc7566c737e050c6071a8f65e2ed

    • SHA256

      1b0e5847f75b8b3777be352bfab786cfb5c412d83f77d9470c830d42596d3cbd

    • SHA512

      2e9442161fdada893dcda54a99299ea224c2ec262bd2012e37db6643d45860e7151332b79b348d10ce1b6c0bc5357f393874e16e0cc3caea19030cc0f01b0e4b

    • SSDEEP

      12288:cC9QZgYxMa29AS087kHCqZ+bwRO7bUjkgkruWSOHwWEQiii8VPfEw/TziDQIRyKK:ct+Yd29AX87kHCMVROfuhQiiiuPGI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks