General

  • Target

    674ed29eea46d6fc69ab4eb50ea9e3d66710589cf3be3217508836a6bec2ee29

  • Size

    1.9MB

  • Sample

    241110-bp8xtswfqb

  • MD5

    2bee6720a3cbdb728ffdda1fef557374

  • SHA1

    1e8fba4adfc7150f112355e0d24afd9fe3916eac

  • SHA256

    674ed29eea46d6fc69ab4eb50ea9e3d66710589cf3be3217508836a6bec2ee29

  • SHA512

    cde1afb2b8963840f99bfaad2da0c9bb8f750c17c883758d492ff0e558c039f2170b60edb17f150e4621a80378473abe3b6976bb65353f77c92efda5dbe71440

  • SSDEEP

    49152:e06m7NpA0GNJ/lU+zJwZjvjcpT+gDEvTqb8Td/pP6F:eA7UJ/5zGZjvjcQgGqYJ

Malware Config

Extracted

Family

redline

Botnet

@merlinholy

C2

185.189.167.123:37360

Attributes
  • auth_value

    9c36b63cccb3eade62bdc17519c7bd37

Targets

    • Target

      674ed29eea46d6fc69ab4eb50ea9e3d66710589cf3be3217508836a6bec2ee29

    • Size

      1.9MB

    • MD5

      2bee6720a3cbdb728ffdda1fef557374

    • SHA1

      1e8fba4adfc7150f112355e0d24afd9fe3916eac

    • SHA256

      674ed29eea46d6fc69ab4eb50ea9e3d66710589cf3be3217508836a6bec2ee29

    • SHA512

      cde1afb2b8963840f99bfaad2da0c9bb8f750c17c883758d492ff0e558c039f2170b60edb17f150e4621a80378473abe3b6976bb65353f77c92efda5dbe71440

    • SSDEEP

      49152:e06m7NpA0GNJ/lU+zJwZjvjcpT+gDEvTqb8Td/pP6F:eA7UJ/5zGZjvjcQgGqYJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks