General

  • Target

    05c149cd067fcea874100bc4ee64df7880e72bc211fa42f1325d4ffb9281d0a9.exe

  • Size

    4.6MB

  • Sample

    241124-khbs7aykal

  • MD5

    d86d75d5a8dea759decaff645a7df955

  • SHA1

    fdc9c359f4234bfee14f1a8313af737232a4297d

  • SHA256

    05c149cd067fcea874100bc4ee64df7880e72bc211fa42f1325d4ffb9281d0a9

  • SHA512

    deb0164d9c060b35676bc43c57df027415f26c1256cdb6fa09ce6f21d24e21e597f190141a549ba5d252e4fca894a618ab71a41a4af357868dc5af093c43beb7

  • SSDEEP

    98304:3Lmwt3iDDTsfBbMNYn1Ody2FSgW9Yh1qiVhfLx/AcVC+OPbjp1tOYk8Bm2GRdZr5:oTKBMNOOclYhYib7VC+gb5k8Bf815

Malware Config

Extracted

Family

redline

Botnet

@e0neee

C2

185.209.22.181:29234

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      05c149cd067fcea874100bc4ee64df7880e72bc211fa42f1325d4ffb9281d0a9.exe

    • Size

      4.6MB

    • MD5

      d86d75d5a8dea759decaff645a7df955

    • SHA1

      fdc9c359f4234bfee14f1a8313af737232a4297d

    • SHA256

      05c149cd067fcea874100bc4ee64df7880e72bc211fa42f1325d4ffb9281d0a9

    • SHA512

      deb0164d9c060b35676bc43c57df027415f26c1256cdb6fa09ce6f21d24e21e597f190141a549ba5d252e4fca894a618ab71a41a4af357868dc5af093c43beb7

    • SSDEEP

      98304:3Lmwt3iDDTsfBbMNYn1Ody2FSgW9Yh1qiVhfLx/AcVC+OPbjp1tOYk8Bm2GRdZr5:oTKBMNOOclYhYib7VC+gb5k8Bf815

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks