General

  • Target

    d7db544b63d379c697b2c07ce8e3541fcce66d6d23f2da25c3a0467866f23a03

  • Size

    184KB

  • Sample

    241109-gdegqsyfnb

  • MD5

    1c322dbfae3f478acc70bd5415a6936c

  • SHA1

    cc06f2ed2bcd976c39c6eede8ec6972e6a6df13c

  • SHA256

    d7db544b63d379c697b2c07ce8e3541fcce66d6d23f2da25c3a0467866f23a03

  • SHA512

    a6efe9ccf5974eac62c4da7360d9e8ecb2ec8717d1f8ce6d79f84213672158757ea8a5134ff1b97247443bec438b00a04d224de567498cc3e52aba6233686aa9

  • SSDEEP

    3072:7sxQPYp+h8Rv8sze4cmWlQQMXk/A6ucLo7mN4GIafL1dKX64w6a86Xeb4mtWbSOB:X6cS8Ie4tW6QMsAnXM4GIeL464N6ubPQ

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      46666096ece6d7c0d0cd3e11eb60291607362dfc6a8ed65a843c9ee0a3091177

    • Size

      399KB

    • MD5

      d18952fdf658225bf98f98d5f0b39b96

    • SHA1

      152d865e5a34cfc366e7b25509aadf32f4738bfb

    • SHA256

      46666096ece6d7c0d0cd3e11eb60291607362dfc6a8ed65a843c9ee0a3091177

    • SHA512

      6f8202c90afa63e0a7da6933df31b187d2f6fcf6fb9b7ae55e7720730739c161c9a9c9f0d0016f2c7a84633681f461ad9c2b9590b7ca241011fd6800a3c28e14

    • SSDEEP

      6144:56DCxLT52vMishn5u9OC9ZjYAO42SksxyBZ04gM4DkfXin8DN:56DCxLT52vMiy7W2Dwkf9N

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks