General

  • Target

    2024-11-21_dbec94988373788339d35821a564ab4f_avoslocker_luca-stealer

  • Size

    1.2MB

  • Sample

    241121-f6pyhayqex

  • MD5

    dbec94988373788339d35821a564ab4f

  • SHA1

    77d168f4e39fe6bb40c641fa6ea5da6c578a0839

  • SHA256

    b1dea2ce60b69675255eed5e916bdb8362c900cef76673e6e359bdd5723bcf9f

  • SHA512

    b03ea0321534b2eaab1492987a6c23ad50aabd4e53ae70edd3c14f694801fb90f6a426c8f4100a5ce88fbb811885d4a279d7556aa081c54464b18965a23c21f0

  • SSDEEP

    6144:fabzQlv3Q4sM6u43YLQ0h2DBAOD4CANwSGRG5qtt0j+kXW8dw4/CZOFEv38:fabzQlv3Q4f6uyBt+6SuupaB8rzivM

Malware Config

Extracted

Family

redline

C2

135.181.173.163:4326

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Targets

    • Target

      2024-11-21_dbec94988373788339d35821a564ab4f_avoslocker_luca-stealer

    • Size

      1.2MB

    • MD5

      dbec94988373788339d35821a564ab4f

    • SHA1

      77d168f4e39fe6bb40c641fa6ea5da6c578a0839

    • SHA256

      b1dea2ce60b69675255eed5e916bdb8362c900cef76673e6e359bdd5723bcf9f

    • SHA512

      b03ea0321534b2eaab1492987a6c23ad50aabd4e53ae70edd3c14f694801fb90f6a426c8f4100a5ce88fbb811885d4a279d7556aa081c54464b18965a23c21f0

    • SSDEEP

      6144:fabzQlv3Q4sM6u43YLQ0h2DBAOD4CANwSGRG5qtt0j+kXW8dw4/CZOFEv38:fabzQlv3Q4f6uyBt+6SuupaB8rzivM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks