General

  • Target

    60ff4edb80addc2de4a37fa61e4c811daa8ada05fe6df70f024a3b916d2c2615

  • Size

    1.5MB

  • Sample

    241106-1v7z6ayhlq

  • MD5

    02a84844c72293cfdbedbaee28c0f49f

  • SHA1

    d00ef6093ef4b87b4d9a61a321335fb3d8280315

  • SHA256

    60ff4edb80addc2de4a37fa61e4c811daa8ada05fe6df70f024a3b916d2c2615

  • SHA512

    a52689ecf9760561e766d64d704e051013b884c6426bac7bbb560999aeeb5bbc047f4bca9a3508f851fb05109424aec0cf753273df1c6323b9cb7cc2efe607ab

  • SSDEEP

    24576:Zeacs1vXtGBWz5cbwkNixCT3Mb9rmnibyQUlp:1csZsTb3ixs+mn6ypp

Malware Config

Extracted

Family

redline

Botnet

1

C2

62.204.41.177:9425

Attributes
  • auth_value

    2c239ad7c28c8eab1f9626557bb9457a

Targets

    • Target

      60ff4edb80addc2de4a37fa61e4c811daa8ada05fe6df70f024a3b916d2c2615

    • Size

      1.5MB

    • MD5

      02a84844c72293cfdbedbaee28c0f49f

    • SHA1

      d00ef6093ef4b87b4d9a61a321335fb3d8280315

    • SHA256

      60ff4edb80addc2de4a37fa61e4c811daa8ada05fe6df70f024a3b916d2c2615

    • SHA512

      a52689ecf9760561e766d64d704e051013b884c6426bac7bbb560999aeeb5bbc047f4bca9a3508f851fb05109424aec0cf753273df1c6323b9cb7cc2efe607ab

    • SSDEEP

      24576:Zeacs1vXtGBWz5cbwkNixCT3Mb9rmnibyQUlp:1csZsTb3ixs+mn6ypp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks