General

  • Target

    4632bb45dfebf24f833fd965c44e1e1610f7d16c4e7a894c6b153f327b674676

  • Size

    1.7MB

  • Sample

    231103-s5knlsga74

  • MD5

    3fb2d078e577a3c835658e4776f10471

  • SHA1

    5abbef3e9c787293f82df4ebe061ebd15c07b1ba

  • SHA256

    4632bb45dfebf24f833fd965c44e1e1610f7d16c4e7a894c6b153f327b674676

  • SHA512

    d623d6f5ec2fa8a763be353832ac1ea3159fc7c1fdfebc4af96150d2e0265e5e16576747d8cd66916b3881e9919572829f13050e47e3ec520749eac46ee760a9

  • SSDEEP

    24576:hy5e7A9XzKmLLsAexYsA8bi0IcMt2LvI3bqu7b7vbTv09wAjTTmfI8yMZh8HqkmK:UI7A9DKmLLTDkLviHw/sI8p78mqGv2

Malware Config

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Targets

    • Target

      4632bb45dfebf24f833fd965c44e1e1610f7d16c4e7a894c6b153f327b674676

    • Size

      1.7MB

    • MD5

      3fb2d078e577a3c835658e4776f10471

    • SHA1

      5abbef3e9c787293f82df4ebe061ebd15c07b1ba

    • SHA256

      4632bb45dfebf24f833fd965c44e1e1610f7d16c4e7a894c6b153f327b674676

    • SHA512

      d623d6f5ec2fa8a763be353832ac1ea3159fc7c1fdfebc4af96150d2e0265e5e16576747d8cd66916b3881e9919572829f13050e47e3ec520749eac46ee760a9

    • SSDEEP

      24576:hy5e7A9XzKmLLsAexYsA8bi0IcMt2LvI3bqu7b7vbTv09wAjTTmfI8yMZh8HqkmK:UI7A9DKmLLTDkLviHw/sI8p78mqGv2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks