General

  • Target

    255d6707891f1213c17b309fd5d8a4be3dab304dcd38467cf9593cf6a4f74489

  • Size

    116KB

  • Sample

    241109-2m4hfatfpc

  • MD5

    e581c3046f48ab904cc9413540140dac

  • SHA1

    a8f83e7b311bd12a57a146d39e3c0ae553711876

  • SHA256

    255d6707891f1213c17b309fd5d8a4be3dab304dcd38467cf9593cf6a4f74489

  • SHA512

    534f10d495cfe700fc6487c8c7ccff467a49823409e3803e77564f710502239bc6d8689b6920ab383e89ca01c33b2df119984c8a2eea3b4f98e21bbe18a2e207

  • SSDEEP

    3072:AMLSHJ455dTjW01kNjHGT0uEye8Yjlp3AcXpnnmHmK3Z5:Bqm5XS01k40ue8SBAcXpnBo5

Malware Config

Extracted

Family

redline

Botnet

4

C2

176.124.201.56:25784

Attributes
  • auth_value

    1f101d9c1105a19254187500b2403d48

Targets

    • Target

      c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b.exe

    • Size

      282KB

    • MD5

      df9005eaec4232a802cb205ddafce262

    • SHA1

      90a545934efd744c7314d90d749f7249ddc40011

    • SHA256

      c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b

    • SHA512

      e1f61d7280f58c68c823ee82d74ffa56a7d59ac229754a39721f9396bdc2a9b5ddc29ac927fb4618cd8fe6387392f9bee20f79f8047741f8b9cac662e91dd4e7

    • SSDEEP

      6144:7pLDN9eNbG2OeBdfvcMtamj7EVYDWKgoAK0lT:7pLDN9eM27/qQW8ANl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks