General

  • Target

    1870acc9a07734fe68ee663e671422b41c31010b450a60cf93c643012bee12a4.exe

  • Size

    212KB

  • Sample

    241121-bm61fsyamq

  • MD5

    a6dfbc0654909c203fa095a0c085791b

  • SHA1

    75be4fa2816a7de64e9b48b2f043b8395d42250f

  • SHA256

    1870acc9a07734fe68ee663e671422b41c31010b450a60cf93c643012bee12a4

  • SHA512

    5737df1b255513cddd3fde20aedbfc53aacb25e3b9fd0ad11e3460de8621b602649e6771e35501125ba688f6d34799bcfa41126b7a28e19910359645783bf986

  • SSDEEP

    1536:GfyxN9r3PWQF1Ree4OWyzY6I4HLSaIMNnapdr/DRbH5Tc+QRRk9pqXWLcOh6P3XW:AoN5+m1kenPT/LSaISnkRbRxaGbLQ3m

Malware Config

Extracted

Family

redline

Botnet

@bloodyrain12

C2

51.91.193.177:18717

Attributes
  • auth_value

    74a8f00abc3c55d9a0655f0cea4e3580

Targets

    • Target

      1870acc9a07734fe68ee663e671422b41c31010b450a60cf93c643012bee12a4.exe

    • Size

      212KB

    • MD5

      a6dfbc0654909c203fa095a0c085791b

    • SHA1

      75be4fa2816a7de64e9b48b2f043b8395d42250f

    • SHA256

      1870acc9a07734fe68ee663e671422b41c31010b450a60cf93c643012bee12a4

    • SHA512

      5737df1b255513cddd3fde20aedbfc53aacb25e3b9fd0ad11e3460de8621b602649e6771e35501125ba688f6d34799bcfa41126b7a28e19910359645783bf986

    • SSDEEP

      1536:GfyxN9r3PWQF1Ree4OWyzY6I4HLSaIMNnapdr/DRbH5Tc+QRRk9pqXWLcOh6P3XW:AoN5+m1kenPT/LSaISnkRbRxaGbLQ3m

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks