General

  • Target

    c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b

  • Size

    839KB

  • Sample

    241111-a8bwrssjhr

  • MD5

    b304b0fb07f16000438b03c792efef7b

  • SHA1

    243d1d6bd113dd3816d41ffd5498499686cb2ef5

  • SHA256

    c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b

  • SHA512

    a00dcea909f8351f4e217b5d79e6f55ecc111d4f652b577e50b70d076d5a354119fb752b8c06844c561db2d73fc62b344c3916653523dc4d7c580828af4ddfcf

  • SSDEEP

    24576:0ymvHoR0dJqCvkO7wCVMyuJK8MsiCA7PNC:DQIudJVvhTVSJK8W3P

Malware Config

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Targets

    • Target

      c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b

    • Size

      839KB

    • MD5

      b304b0fb07f16000438b03c792efef7b

    • SHA1

      243d1d6bd113dd3816d41ffd5498499686cb2ef5

    • SHA256

      c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b

    • SHA512

      a00dcea909f8351f4e217b5d79e6f55ecc111d4f652b577e50b70d076d5a354119fb752b8c06844c561db2d73fc62b344c3916653523dc4d7c580828af4ddfcf

    • SSDEEP

      24576:0ymvHoR0dJqCvkO7wCVMyuJK8MsiCA7PNC:DQIudJVvhTVSJK8W3P

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks