General

  • Target

    2024-10-23_f324c1d8c0d086f0c340ba2ad68b9ee1_avoslocker_cobalt-strike

  • Size

    577KB

  • Sample

    241023-qgbppatemm

  • MD5

    f324c1d8c0d086f0c340ba2ad68b9ee1

  • SHA1

    ab286c6cf5cb800a54e76ea3d6cb5e0bfdf572a1

  • SHA256

    1917422fc4ddd6cac828d67a6a1e17d48133ce86ba79467fd77160980a88dbf0

  • SHA512

    8e9fe36dc60f828871bc242090ea946ce9543b089acecd8800979ed2a1b0f7f1ba9d7d37fd09ace0f08d5e5281d7afd6ba364ce6632250e9b3b240aac98044e0

  • SSDEEP

    12288:rljR3Z64BX90Qzt/MrqQBXbRztnCjFrAcKfOVJPk0y9t9D:hR3ZNBX90QtEhbRhAxOfOVVk0yHx

Malware Config

Extracted

Family

redline

Botnet

1

C2

95.216.249.153:81

Attributes
  • auth_value

    a290efd4796d37556cc5af7e83c91346

Targets

    • Target

      2024-10-23_f324c1d8c0d086f0c340ba2ad68b9ee1_avoslocker_cobalt-strike

    • Size

      577KB

    • MD5

      f324c1d8c0d086f0c340ba2ad68b9ee1

    • SHA1

      ab286c6cf5cb800a54e76ea3d6cb5e0bfdf572a1

    • SHA256

      1917422fc4ddd6cac828d67a6a1e17d48133ce86ba79467fd77160980a88dbf0

    • SHA512

      8e9fe36dc60f828871bc242090ea946ce9543b089acecd8800979ed2a1b0f7f1ba9d7d37fd09ace0f08d5e5281d7afd6ba364ce6632250e9b3b240aac98044e0

    • SSDEEP

      12288:rljR3Z64BX90Qzt/MrqQBXbRztnCjFrAcKfOVJPk0y9t9D:hR3ZNBX90QtEhbRhAxOfOVVk0yHx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks