General

  • Target

    c599b74cf46f4d7ed772e5371ee3a02627e1bd9f0d3d294ccb4d744a5f34abb0

  • Size

    1.7MB

  • Sample

    231103-xvvhaaba95

  • MD5

    a9dbc0677ae135e8809063a8a0e53125

  • SHA1

    e25473f24fad3c29c1db998fd1c80f4fbd5f7a9d

  • SHA256

    c599b74cf46f4d7ed772e5371ee3a02627e1bd9f0d3d294ccb4d744a5f34abb0

  • SHA512

    e95cefeeb9b1fd4dc5aa738d44caa1cdda3b23361d2973553f21512c2d011ef8481f1189c2ba0fbe11cf3c1b48554aa242bf7d5a2c68e4ffc6a388641bbb791c

  • SSDEEP

    24576:3y6FdKQTorUSe/C5hxViMGIspHMZPoRGrTpKvzf18rjY7xlJ4h0DhyVPJ:C6jK+ooSekVidLspoRYKvzWrjXWUP

Malware Config

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Targets

    • Target

      c599b74cf46f4d7ed772e5371ee3a02627e1bd9f0d3d294ccb4d744a5f34abb0

    • Size

      1.7MB

    • MD5

      a9dbc0677ae135e8809063a8a0e53125

    • SHA1

      e25473f24fad3c29c1db998fd1c80f4fbd5f7a9d

    • SHA256

      c599b74cf46f4d7ed772e5371ee3a02627e1bd9f0d3d294ccb4d744a5f34abb0

    • SHA512

      e95cefeeb9b1fd4dc5aa738d44caa1cdda3b23361d2973553f21512c2d011ef8481f1189c2ba0fbe11cf3c1b48554aa242bf7d5a2c68e4ffc6a388641bbb791c

    • SSDEEP

      24576:3y6FdKQTorUSe/C5hxViMGIspHMZPoRGrTpKvzf18rjY7xlJ4h0DhyVPJ:C6jK+ooSekVidLspoRYKvzWrjXWUP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks