General

  • Target

    KasperskySecurity.zip

  • Size

    4.2MB

  • Sample

    240211-rcq49aah43

  • MD5

    32a580c05b4a6f26f12327f1fd4ce7ab

  • SHA1

    bb6d3fb2242af853329fafe2005e134b82d3e752

  • SHA256

    72a9b9315390d523045bd1a7578f2e60660e140e548b22185630b3f6f6449ce2

  • SHA512

    e6cb6ab15f8f405916d911e88e7701b4b8a6790f561edcd47df9aae4ae31ba37f8249b943c3b2e6f449036081eb5b56811ce4440b8724553eb7cbedc544bf111

  • SSDEEP

    98304:dVHmedcZlN92E1Rip7DuUPllxitQR6WxKWlT4xCSYHvY2R9L9b9kj:5cPzj1RQD1PlfWWHcoRF9b9kj

Malware Config

Extracted

Family

redline

Botnet

@sc4lly1337

C2

185.215.113.83:60722

Attributes
  • auth_value

    cb96f2ad461ba2dc951cb5a868225e22

Targets

    • Target

      KasperskySecurity/KasperskySecurity.exe

    • Size

      4.2MB

    • MD5

      7b964a77140ecb6fd10d488db67f4ddc

    • SHA1

      7defebad9e62037980eca8c88a814d6302a7996f

    • SHA256

      8d114d5ff304b27af3934844fd0261dbb45a4267208a82a2fc360e2a4bf257b0

    • SHA512

      2af13dd4389a575faa06d8750cf4f868fe817f5471bfc0f4b271a872fef71d8db30c63447662a975f15f4b16035952ee8658c209e722942d6025a24d40f0a3be

    • SSDEEP

      98304:MQAkEo3iq6JiAACA2TFHQscJhj5jsft1EIFjVWJyMR:MQA7YpUPA2wtjsbEoVSFR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks