General

  • Target

    ceedf0469783ec4ca42957bb1e66cacd270a6dc16fc845e0cdef7b3d7c3b58c5

  • Size

    324KB

  • Sample

    241111-cfxc4syrfw

  • MD5

    88ac87ab3e33259e696f2b1a379c17b2

  • SHA1

    7a0886f7c6219e8d3bac9644ea6459c555298d19

  • SHA256

    ceedf0469783ec4ca42957bb1e66cacd270a6dc16fc845e0cdef7b3d7c3b58c5

  • SHA512

    20e2a37cc077f651e9eb394e403b24f26fd4768d43aca2ffb692d836327bf9eb4d8ce20ec8dab5ce6dc51134c965a58270bbc09ca760e462a02493f45e465c13

  • SSDEEP

    6144:BTczIkwEr9+f7+XetjlkUa5TzmqPGV2TIvEHclZ+xcBIXak+V50yu0:BTjkZrITrnkCqPGV2/8lECCXak05hu0

Malware Config

Extracted

Family

redline

Botnet

@retr11k

C2

zumbemclat.xyz:81

Attributes
  • auth_value

    fed6a2ebe9a9652e2caca70aff44bfb9

Targets

    • Target

      ba55ad4b1455f5cad686bf4ca883577dc98ebc05fffd79c7bc104e9304c181c0

    • Size

      833KB

    • MD5

      439786cfa948f5ca38d3d269fb674da5

    • SHA1

      6b8b09fdbe20f6a78db952faad120e60204b786e

    • SHA256

      ba55ad4b1455f5cad686bf4ca883577dc98ebc05fffd79c7bc104e9304c181c0

    • SHA512

      bfd58d8c3567b715bfebdfa12ae5b4c050b55fe6b39d63a277faaba70866b3c38f6a2f1f950f0b77b02a7c187e139e3849ac318d73f04e2dfe8c9246b4cf325b

    • SSDEEP

      6144:Iuv+WQbU/SUgJ4v84B/wb9QyaVvQBc6FqOMRc5Sw2yhbxKXW4t+oLelfl3mymGCM:DvoKPgJd/FwI5bxhoLeL3mbGr3nT3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks