General

  • Target

    NEAS.eae8f6cd8d9e27c2b594e841e8fd3e40_JC.exe

  • Size

    1.2MB

  • Sample

    231105-egaxlsce54

  • MD5

    eae8f6cd8d9e27c2b594e841e8fd3e40

  • SHA1

    969b4e92efc77df1b86e269f0086f4d02f1d0738

  • SHA256

    3c31eec81d97117fbd85e8ffa23627d96bea407603eebd78be0383897b925e86

  • SHA512

    a909490cfcc0a9c9b71a3ac7847fd52ca31e072f1dbfb464a06ca5103d7cbedfc1d86a7eeadcaa20139211ebe48e8fb1f6194ddf539660de58243fe3bcc0df52

  • SSDEEP

    24576:ay0B6S9uu5TTcvGPGFaBvLX4dDmaNFHk3PUC8tuCV9bIHGIhhayYQFh13:h0Byu5/JeFaByDmMFHk3PUC8tuA8Gv8

Malware Config

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Targets

    • Target

      NEAS.eae8f6cd8d9e27c2b594e841e8fd3e40_JC.exe

    • Size

      1.2MB

    • MD5

      eae8f6cd8d9e27c2b594e841e8fd3e40

    • SHA1

      969b4e92efc77df1b86e269f0086f4d02f1d0738

    • SHA256

      3c31eec81d97117fbd85e8ffa23627d96bea407603eebd78be0383897b925e86

    • SHA512

      a909490cfcc0a9c9b71a3ac7847fd52ca31e072f1dbfb464a06ca5103d7cbedfc1d86a7eeadcaa20139211ebe48e8fb1f6194ddf539660de58243fe3bcc0df52

    • SSDEEP

      24576:ay0B6S9uu5TTcvGPGFaBvLX4dDmaNFHk3PUC8tuCV9bIHGIhhayYQFh13:h0Byu5/JeFaByDmMFHk3PUC8tuA8Gv8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks