General

  • Target

    e91a7aa798e0be3529e317499d0b8d62f5908e5b

  • Size

    289KB

  • Sample

    241110-zzsklaykgj

  • MD5

    33fa01402b74d2b10f4314207d300251

  • SHA1

    e91a7aa798e0be3529e317499d0b8d62f5908e5b

  • SHA256

    591acaec4430ae2f7cd61b3bfb633652fdc36e38956a3183d58b6bbf2a3d90b2

  • SHA512

    0af96c1f695ea881764b80b75ce1a84aa4e1bbc5a78f959abc721bfa8ee5308c07742127f8aaf1c62ba7fb1288ba4433b92a05df00d9801c248053212df2cb63

  • SSDEEP

    6144:k1o6jEYdtBX1joEi+AO7CEgHq4IcO9I9pYw3C:k1VjE4rxcdC

Malware Config

Extracted

Family

redline

Botnet

REDLINEVIP (TG: @Fatherofcarders) 150K

C2

178.32.215.163:17189

Attributes
  • auth_value

    0f7b7a0ecd1083169a37fc5d6e242919

Targets

    • Target

      e91a7aa798e0be3529e317499d0b8d62f5908e5b

    • Size

      289KB

    • MD5

      33fa01402b74d2b10f4314207d300251

    • SHA1

      e91a7aa798e0be3529e317499d0b8d62f5908e5b

    • SHA256

      591acaec4430ae2f7cd61b3bfb633652fdc36e38956a3183d58b6bbf2a3d90b2

    • SHA512

      0af96c1f695ea881764b80b75ce1a84aa4e1bbc5a78f959abc721bfa8ee5308c07742127f8aaf1c62ba7fb1288ba4433b92a05df00d9801c248053212df2cb63

    • SSDEEP

      6144:k1o6jEYdtBX1joEi+AO7CEgHq4IcO9I9pYw3C:k1VjE4rxcdC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks