General

  • Target

    70a578f7f58456e475facd69469cf20a.bin

  • Size

    422KB

  • Sample

    240611-c5jhjssaqq

  • MD5

    1924db6d48c41d0da1136d29fe322769

  • SHA1

    5493cfb4ef9d93afc53ddd82b9c376eed95dffca

  • SHA256

    c8e23b0ecbae8d3822220459c5d7774feafaad0aeabea944e8f61503167ef9ea

  • SHA512

    72e93910eff0a0369242a0d68c774c8e7b0fddbb42804b31e28b37ac8892181633296a2a652bad9639b2af26b42dbdfb2ae2abfe561e0be17d8e730146530730

  • SSDEEP

    6144:TFn5sXFepghLnn2KQdj0sfMRWeJW+c48RFR2J5XadS/Hlxt1Lql6fDm3dJ8n5y4y:xCcOhL27pMRWz+gwYdS/Hj3WI6tJ+Yx

Malware Config

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.27.237:13528

Targets

    • Target

      5c8d556e39269b22e63ba9c941ff306bb043bc35125ba08787617577231b381a.exe

    • Size

      522KB

    • MD5

      70a578f7f58456e475facd69469cf20a

    • SHA1

      83e147e7ba01fa074b2f046b65978f838f7b1e8e

    • SHA256

      5c8d556e39269b22e63ba9c941ff306bb043bc35125ba08787617577231b381a

    • SHA512

      707ed48b45978d26faaf3544bf22912461503d6e4b1a077cbb7c3a8abd2f1eb3fec16b2786a79ae4db2dfec92f662ece1998bc142706d2b482599fb6191563c0

    • SSDEEP

      12288:dJStzAr5BeoKKYOr0ukzbMpbV4CvhbDyUdt1c6SEw7ZBEO:dMz+coKkzk3MpbIMrcvHZBt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks