General

  • Target

    06ea4cef07b4a90b91341877871a043266b495eb13c8575a96beef0ca889b24b

  • Size

    1.3MB

  • Sample

    241110-14wy9azkdq

  • MD5

    09c2b9e7013992c25d7445562ac5f385

  • SHA1

    29ce149c59498f01ca0544c6a90c2a49e0c9e8c4

  • SHA256

    06ea4cef07b4a90b91341877871a043266b495eb13c8575a96beef0ca889b24b

  • SHA512

    e4ba9e73b197cc64ea724eabd2abd1a5b2806161615ff2b925ad14f27df46631a090584b48a0702334b1a7b59bbbf484e1337b7d1105bbc4b9193a8812f40d54

  • SSDEEP

    24576:mk9TW7BC1SO5rXySJhoJLawHlljbg+c67qy7WZaqh+TUGBqFF4rW5yQaakBIJZsw:m6W7AxkJLawHlljbg+XO40aqggGB1ra1

Malware Config

Extracted

Family

redline

C2

193.233.20.13:11552

Attributes
  • auth_value

    0d9e71e174d59afbdff517e2e2cd8a4a

Targets

    • Target

      tr-AAES.exe

    • Size

      3.3MB

    • MD5

      fc2a89525cf6b2615bc56a9fd3bdfd61

    • SHA1

      47a08f01ea4e944088535e27019d5fd085d64989

    • SHA256

      aacfd435b03407745b69e66aaca7b2a29b7b6bc94ddbdd5fbeb2f4f766318cc2

    • SHA512

      44962a10505e89bc2b67295a0dd026ed8d4c614e9fc7698812414e1e21682542598df068065980c7dba1252b134184dd8cec6b9ba7c94e35b0483b816f41e0d0

    • SSDEEP

      49152:Yr/dCoJ6rwDoU/w64E3849vSZwvsHr5A:YrOEYZK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks