General

  • Target

    fb8e53e200262a647fa369f99a6b0149669cffb70326dc5e2b48c7c858b7f290

  • Size

    1.2MB

  • Sample

    241111-a13dra1rdq

  • MD5

    111ab252a33ef86c50999360d6074e75

  • SHA1

    60cda8c9ab4edad5284d9e859fc979636b2712a3

  • SHA256

    fb8e53e200262a647fa369f99a6b0149669cffb70326dc5e2b48c7c858b7f290

  • SHA512

    656619dc12267971277a60cb50b8f0444c60f070b96dcfe13d7f7a26801220965798b9f56ca6857c21b7ca961f5033c4072af0c689f40201c688339fa6c721af

  • SSDEEP

    24576:TLn1Z2yBtKI4xMFXkIGBGVpD9BSWmA1y1Z4YsQ:/f5KIArb4VpE

Malware Config

Extracted

Family

redline

Botnet

SETH

C2

185.215.113.217:25060

Attributes
  • auth_value

    1442d36104cc73a201f7fb26fd29dadd

Targets

    • Target

      fb8e53e200262a647fa369f99a6b0149669cffb70326dc5e2b48c7c858b7f290

    • Size

      1.2MB

    • MD5

      111ab252a33ef86c50999360d6074e75

    • SHA1

      60cda8c9ab4edad5284d9e859fc979636b2712a3

    • SHA256

      fb8e53e200262a647fa369f99a6b0149669cffb70326dc5e2b48c7c858b7f290

    • SHA512

      656619dc12267971277a60cb50b8f0444c60f070b96dcfe13d7f7a26801220965798b9f56ca6857c21b7ca961f5033c4072af0c689f40201c688339fa6c721af

    • SSDEEP

      24576:TLn1Z2yBtKI4xMFXkIGBGVpD9BSWmA1y1Z4YsQ:/f5KIArb4VpE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

    • Target

      .enigma2

    • Size

      280KB

    • MD5

      5b5894b2a6681f373b7743f16892a5f4

    • SHA1

      1c17d022a727c6ef6411aff0cb4fb53bbe836efe

    • SHA256

      d5003e5921f9e28479ee19e6abd1d40a2e9bba567163cbd5f5d7442592900743

    • SHA512

      999a5729f8c7e525b85f21cea413fcacf6cfd36396c1ff7906f516a3f64e0a7a2d7175a16e76a27010507a8ff0db909476ee5570ece1ed24bd549f619f8e6952

    • SSDEEP

      3072:OoIaFhB6mTJXViWmAhTgDk7pBqDg0WlsbJWiQMrQX9eGyR34Ysgu1iUDbZgtap8M:RhhBD+WmAawdqJnQhryZ4YshOi

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks