General

  • Target

    4d9bea57826f770c3a3e696d2d6b3e83a812e9d705e6f6d8a533d0e4bf62ccbb

  • Size

    1.4MB

  • Sample

    231101-t7ljcscc43

  • MD5

    0e1cf04c2d688bd79b8c98c5ee931284

  • SHA1

    b1b5cce59da9d5dd522ff7906eaad4738909cae6

  • SHA256

    ce1c9194422368898717517c5482754243961d05a13bb0a8c2879c6bb0326616

  • SHA512

    8b3b30babe3ad2168cd25c671e48b68d37379d731704ae0647c757090c12294871313b8c67d2e1aac42ecf41765367399ebff91455b3bcd7cbe25603fd1bfe9c

  • SSDEEP

    24576:ryGHGS4LUQ62J274+iC09+L2kAw8AGulh06KzmAybHonLLj8wssPURV9fWAvh3:eoYLUQgJil+akl8OhQTnLLj8DRVRWYV

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      4d9bea57826f770c3a3e696d2d6b3e83a812e9d705e6f6d8a533d0e4bf62ccbb

    • Size

      1.5MB

    • MD5

      0bbe0f48f0f4195776df48611363176d

    • SHA1

      ff61aff512d07a409859810f5a6c7ffd240559db

    • SHA256

      4d9bea57826f770c3a3e696d2d6b3e83a812e9d705e6f6d8a533d0e4bf62ccbb

    • SHA512

      e3e532cd49f089270f301ce3750793ffde5edf0f41bc3b5d518660ecde682360f8f942df7cbfce3ec05b559e0186c502438b17a9931e313f49c100f9a0a5f1c1

    • SSDEEP

      24576:Xy1HGa43UQ6cJ2p4saa07+/2kZ8xj9Rw6qEiyb7olLTj8kichUq0:iNe3UQyna7+OkZ8xJRE9lLTj8P

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks