General

  • Target

    85e9c6278c99a25f02eb16d17b9243cc4b00dcc61553fb68e837c0401ffc1278.exe

  • Size

    1.2MB

  • Sample

    240811-brfdasybln

  • MD5

    bf1f02d4475fffd803467489889fa729

  • SHA1

    e9fdfe45b6477441f5bed47751eaf9ee3c708bf1

  • SHA256

    85e9c6278c99a25f02eb16d17b9243cc4b00dcc61553fb68e837c0401ffc1278

  • SHA512

    748e1babd3be49dfa5d7b5b06e6116129fd807d4bbb281ace296b15e9c2ce70b391ff633811fe5f9cccf7e99ad0c3495f66eb25872c0e94ddf5acbd66a04bc5f

  • SSDEEP

    24576:3AHnh+eWsN3skA4RV1Hom2KXMmHanU0XV9J7pr/hNmEEw1YO6O5:qh+ZkldoPK8Yan7V9J7prGPwTf

Malware Config

Extracted

Family

redline

Botnet

FROSHLOG

C2

94.141.120.25:1912

Targets

    • Target

      85e9c6278c99a25f02eb16d17b9243cc4b00dcc61553fb68e837c0401ffc1278.exe

    • Size

      1.2MB

    • MD5

      bf1f02d4475fffd803467489889fa729

    • SHA1

      e9fdfe45b6477441f5bed47751eaf9ee3c708bf1

    • SHA256

      85e9c6278c99a25f02eb16d17b9243cc4b00dcc61553fb68e837c0401ffc1278

    • SHA512

      748e1babd3be49dfa5d7b5b06e6116129fd807d4bbb281ace296b15e9c2ce70b391ff633811fe5f9cccf7e99ad0c3495f66eb25872c0e94ddf5acbd66a04bc5f

    • SSDEEP

      24576:3AHnh+eWsN3skA4RV1Hom2KXMmHanU0XV9J7pr/hNmEEw1YO6O5:qh+ZkldoPK8Yan7V9J7prGPwTf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks