General

  • Target

    5309171ad9dbfcaa88c6b237b0a4a711d3de5ce145635d066a04827198b4db97

  • Size

    242KB

  • Sample

    241105-vnsn1atrfs

  • MD5

    df192c3d40208d18bbb3f1810544fdab

  • SHA1

    f93fb4e7b12fbd4540638c16ae24bd15b2f6f61b

  • SHA256

    5309171ad9dbfcaa88c6b237b0a4a711d3de5ce145635d066a04827198b4db97

  • SHA512

    46da94670ac30b1fc3fbf0200fdd9b9fc84229e8046bce3af31b326931a2ae779fc02b1f7703c5812d522e9aca2a58d7449dc76d97004b91c5ca9cd450551f04

  • SSDEEP

    6144:l1bU4b9rZN3ehuT8KVQtp8P+z7e6dJIVIGqWzeDJCOjoc:li49dN34tKSa6dJwMCc

Malware Config

Extracted

Family

redline

Botnet

1

C2

107.182.129.73:21733

Attributes
  • auth_value

    3a5bb0917495b4312d052a0b8977d2bb

Targets

    • Target

      d80ce10659442d8e5b9c28e53bf254711881cf9502f52aeb8abf4a15c9e6e36e

    • Size

      464KB

    • MD5

      990c8e3fc56a2734631b51fc61a6779a

    • SHA1

      55a16cc67fc52cdf0690387e083955048106d48a

    • SHA256

      d80ce10659442d8e5b9c28e53bf254711881cf9502f52aeb8abf4a15c9e6e36e

    • SHA512

      f5332bcae3242d86a58adf01069c425f5b22bdda9045200fb5b3d9ab3e983d94af8462a04e148b7164e8d6122ec2d198d18081850e00175bb257c0ddb3defdc5

    • SSDEEP

      12288:zDDF2BjT6XYNn5Bx4ecMEkRP4MwEcGnq48yk:zDDF2VT6XYNjA5kRlfqvyk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks