General

  • Target

    812e6d278ebbc2ed8e2b29729662410bbc50094363c47b23ed3cc8d2a0ada615

  • Size

    1.9MB

  • Sample

    241111-gtegnstlgw

  • MD5

    96bd82e90a79e8db5e9c42e048a02599

  • SHA1

    351443d77e05d083b41081dd64cef1cb64a49817

  • SHA256

    812e6d278ebbc2ed8e2b29729662410bbc50094363c47b23ed3cc8d2a0ada615

  • SHA512

    35620c003f4f2df22b154cf74f900d8e1b2921043f9b2cdd23bba3324a136cac0e0423cb39de2ef374a5304e557d35f8d5fff6a810f3d0e11b2d96c2e14801c3

  • SSDEEP

    49152:e06m7NpA0GNJ/lU+zJwZjvjcpT+gDEvTqb8Td/pP6F:eA7UJ/5zGZjvjcQgGqYJ

Malware Config

Extracted

Family

redline

Botnet

@merlinholy

C2

185.189.167.123:37360

Attributes
  • auth_value

    9c36b63cccb3eade62bdc17519c7bd37

Targets

    • Target

      812e6d278ebbc2ed8e2b29729662410bbc50094363c47b23ed3cc8d2a0ada615

    • Size

      1.9MB

    • MD5

      96bd82e90a79e8db5e9c42e048a02599

    • SHA1

      351443d77e05d083b41081dd64cef1cb64a49817

    • SHA256

      812e6d278ebbc2ed8e2b29729662410bbc50094363c47b23ed3cc8d2a0ada615

    • SHA512

      35620c003f4f2df22b154cf74f900d8e1b2921043f9b2cdd23bba3324a136cac0e0423cb39de2ef374a5304e557d35f8d5fff6a810f3d0e11b2d96c2e14801c3

    • SSDEEP

      49152:e06m7NpA0GNJ/lU+zJwZjvjcpT+gDEvTqb8Td/pP6F:eA7UJ/5zGZjvjcQgGqYJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks