General

  • Target

    28b969497214b4f71c42fa0507c91f63ad4528b6954a0a16250cdde2e7ecfa35

  • Size

    161KB

  • Sample

    241107-b8y7qstalk

  • MD5

    0563dfc171b292ebbf7ecd5564899280

  • SHA1

    fe502c0fea532dedba12a05d60b76c80cbef7225

  • SHA256

    28b969497214b4f71c42fa0507c91f63ad4528b6954a0a16250cdde2e7ecfa35

  • SHA512

    9c33f64dfbed879fcc1f1f56f09d916b8f8aa98797e0e6e811d08194962ba4391f1e1e9e0350fe93d9623da32138243f3c9a1b643d2c0705b0869cc4f82328a6

  • SSDEEP

    3072:jZi5YqGc2UpeVT9f5QCPEDRxxiiw8NyDXwS0h5u25YB0f8Vp4WrLX:Vi5YqGeOT9f5Q9DPy8g7q5u25Y60p4WX

Malware Config

Extracted

Family

redline

Botnet

pub3

C2

89.22.231.25:45245

Attributes
  • auth_value

    ffd0fd0d5630c2c573c643bde2ed50b3

Targets

    • Target

      cdad0022f17eb4230de562bf70835ed58b26afa96c8cfa470a4ba541b5a4d816

    • Size

      355KB

    • MD5

      a4c70d54ba1052681f251618d9d9fc1f

    • SHA1

      bf4e172a65f5271d5c60c3219f36bb15d0d2f585

    • SHA256

      cdad0022f17eb4230de562bf70835ed58b26afa96c8cfa470a4ba541b5a4d816

    • SHA512

      6f7865419dab62b3c44a8f530eb2e62932bb807f8cad8d023f318d4207d5aac81cf6a14905b5bfa2d7f1c694bb94722b98798ba905cbef968ce6ef3edbdf81d6

    • SSDEEP

      6144:xco+Nypp0QGxJ1ryIj7AOqs4xxgI2Zf5Znns1Jl:F+Nypp0QEp7cs4xxgpNs1J

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks