General

  • Target

    1876feb35a7cd14eb3906390ca8711bb50332b652abfc89e918d9185976571ac

  • Size

    123KB

  • Sample

    241110-fcn44szglh

  • MD5

    8da769fa41e5e2ef477a3fcac4b46817

  • SHA1

    8aacd562f92adb5447caff4a5e1f0fc5a765d26b

  • SHA256

    1876feb35a7cd14eb3906390ca8711bb50332b652abfc89e918d9185976571ac

  • SHA512

    6bbabd18bde248fa764b9aa418c733ecc19b5a83e5b07ea70e81174b8d3093c45051d60fc34e658d7313f55867307ec8972bd5b2d198ec6f42b01344b15d0e9c

  • SSDEEP

    3072:WIKvMm+dRA9Kb+N/r28anhYVAVzpQ5oJfsGOlT9:WWPjb+XAVzIif7OlT9

Malware Config

Extracted

Family

redline

Botnet

pub2

C2

89.22.231.25:45245

Attributes
  • auth_value

    ea9464d486a641bb513057e5f63399e1

Targets

    • Target

      eef77f5f93cad5895d93d499ef471e11944cbf455188d7c3550b7445c8067222

    • Size

      285KB

    • MD5

      eb7ebbae9cc7c96b40a739d1a892689d

    • SHA1

      567f31267f43ad62fc5c65fbc75b538a563fe6c0

    • SHA256

      eef77f5f93cad5895d93d499ef471e11944cbf455188d7c3550b7445c8067222

    • SHA512

      70c9aae88838885c2d4b9c88f3dcf088df34f9056dbb3a138595867d37fd04e716acf7bf5539a5be817f064298325c29f4848c279796f334f8425a89bc578044

    • SSDEEP

      6144:PWd9WTYysJfeB7o+rH2aFAIUXt52/aQLjyUGS/l:PWd9WTYtmH1FVU952yQX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks