General

  • Target

    78ec8b0c336927d1b6350d2518d4d6f19f5c3720f3f75fef255c2865570739ad

  • Size

    285KB

  • Sample

    241109-lvhmyasdkl

  • MD5

    52c45558dc4c4667dd9534505d271470

  • SHA1

    282bf652b16bc934c4962351f0945e2f16848cda

  • SHA256

    78ec8b0c336927d1b6350d2518d4d6f19f5c3720f3f75fef255c2865570739ad

  • SHA512

    042f004812c6cdefe4369b2b91f88f4cfb70e31c4eb147a11bc2f612da4ba52be6f2a4b9df759d630b8302f5b917f8e1f7307bd349f8de819263616ff6005355

  • SSDEEP

    6144:EWd9WTYysJfeB7o+rH2N/DE/HoXP7hE4hR9cpl:EWd9WTYtmHS/DEwdE4D9cn

Malware Config

Extracted

Family

redline

Botnet

pub2

C2

89.22.231.25:45245

Attributes
  • auth_value

    ea9464d486a641bb513057e5f63399e1

Targets

    • Target

      78ec8b0c336927d1b6350d2518d4d6f19f5c3720f3f75fef255c2865570739ad

    • Size

      285KB

    • MD5

      52c45558dc4c4667dd9534505d271470

    • SHA1

      282bf652b16bc934c4962351f0945e2f16848cda

    • SHA256

      78ec8b0c336927d1b6350d2518d4d6f19f5c3720f3f75fef255c2865570739ad

    • SHA512

      042f004812c6cdefe4369b2b91f88f4cfb70e31c4eb147a11bc2f612da4ba52be6f2a4b9df759d630b8302f5b917f8e1f7307bd349f8de819263616ff6005355

    • SSDEEP

      6144:EWd9WTYysJfeB7o+rH2N/DE/HoXP7hE4hR9cpl:EWd9WTYtmHS/DEwdE4D9cn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks