General

  • Target

    3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4

  • Size

    589KB

  • Sample

    241110-1kv8lsvpdy

  • MD5

    f55a2ac9b8b8b367edf480a6d28b28f1

  • SHA1

    4a1106b3aa08b58cd6c1385afbe5e9672102c059

  • SHA256

    3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4

  • SHA512

    934a78f241586e65d69fb5f177fa26af7e13191dfc731773e0b6f3c11d63329e8319cc23ffe2102160c52078031ac701c3d8adba0b265598f64246ca18753822

  • SSDEEP

    12288:BMr1y90OlIo7NOFrOgOug766KhjbAHUdjgOU82uG:MyF57NOFJO5KpZd8F82uG

Malware Config

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Targets

    • Target

      3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4

    • Size

      589KB

    • MD5

      f55a2ac9b8b8b367edf480a6d28b28f1

    • SHA1

      4a1106b3aa08b58cd6c1385afbe5e9672102c059

    • SHA256

      3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4

    • SHA512

      934a78f241586e65d69fb5f177fa26af7e13191dfc731773e0b6f3c11d63329e8319cc23ffe2102160c52078031ac701c3d8adba0b265598f64246ca18753822

    • SSDEEP

      12288:BMr1y90OlIo7NOFrOgOug766KhjbAHUdjgOU82uG:MyF57NOFJO5KpZd8F82uG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks