General

  • Target

    9bbca0daa4a41a6ded6a8e8cc10236ae3aff60a25a05581b6b77bd5709e82df3

  • Size

    1.7MB

  • Sample

    231103-q1h8wabd9v

  • MD5

    1201f0620c57315bf1924240fe725586

  • SHA1

    54b9cd889295a2a52407d7e53d5568cc4bf6623b

  • SHA256

    9bbca0daa4a41a6ded6a8e8cc10236ae3aff60a25a05581b6b77bd5709e82df3

  • SHA512

    92c1371a2fe0c14892bd9edd7d74dab6d0b551dff8dda5cccb226002d70d968331c9f70d82a9992651a584987ed3b11c9f46ba67c1ca2ff37a21da0cfb73f16c

  • SSDEEP

    24576:byh2vR/1idLWlnA++RL9eMYcVYMwuJEPHWqaC/dNxMN9AZt5fBJdOF/qGdqCx+q:ONsBTRLIIuJcHWG1m9K5fBJdOFiMq

Malware Config

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Targets

    • Target

      9bbca0daa4a41a6ded6a8e8cc10236ae3aff60a25a05581b6b77bd5709e82df3

    • Size

      1.7MB

    • MD5

      1201f0620c57315bf1924240fe725586

    • SHA1

      54b9cd889295a2a52407d7e53d5568cc4bf6623b

    • SHA256

      9bbca0daa4a41a6ded6a8e8cc10236ae3aff60a25a05581b6b77bd5709e82df3

    • SHA512

      92c1371a2fe0c14892bd9edd7d74dab6d0b551dff8dda5cccb226002d70d968331c9f70d82a9992651a584987ed3b11c9f46ba67c1ca2ff37a21da0cfb73f16c

    • SSDEEP

      24576:byh2vR/1idLWlnA++RL9eMYcVYMwuJEPHWqaC/dNxMN9AZt5fBJdOF/qGdqCx+q:ONsBTRLIIuJcHWG1m9K5fBJdOFiMq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks