General

  • Target

    NEAS.9e94ef1b931f68f722a69465756bbe30.exe

  • Size

    758KB

  • Sample

    231103-l9dbrsac23

  • MD5

    9e94ef1b931f68f722a69465756bbe30

  • SHA1

    f32835ba07cd05bbc2311939ce3b4117f67f21ab

  • SHA256

    c4250eab48d9405545214da261a19ccd6e3e4652a5bde20d9e585bf9e80f2201

  • SHA512

    890469d459e8743b9dbda8b23cf140b4f650c3a6de8c8727f80fa0f776f95102c65d1d1f7076fb21a92c816ca090bae141e104ba1a6b8f6c4102355d45739b40

  • SSDEEP

    12288:qMrwy90iGvdod+IPeKys3IGolDC9VCXmp9EosFw1ODY8h8wlxxUa0bfKN:yyV0dbe3d4DDsVWNosF1Y8h8wtiq

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      NEAS.9e94ef1b931f68f722a69465756bbe30.exe

    • Size

      758KB

    • MD5

      9e94ef1b931f68f722a69465756bbe30

    • SHA1

      f32835ba07cd05bbc2311939ce3b4117f67f21ab

    • SHA256

      c4250eab48d9405545214da261a19ccd6e3e4652a5bde20d9e585bf9e80f2201

    • SHA512

      890469d459e8743b9dbda8b23cf140b4f650c3a6de8c8727f80fa0f776f95102c65d1d1f7076fb21a92c816ca090bae141e104ba1a6b8f6c4102355d45739b40

    • SSDEEP

      12288:qMrwy90iGvdod+IPeKys3IGolDC9VCXmp9EosFw1ODY8h8wlxxUa0bfKN:yyV0dbe3d4DDsVWNosF1Y8h8wtiq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks