General

  • Target

    9d3380ee1ccaae63ca9f39e86630ffe877d0e3ecb711d87dc02350922595dc84

  • Size

    515KB

  • Sample

    241130-vyv7watngl

  • MD5

    a904ae8b26c7d421140be930266ed425

  • SHA1

    c2e246b9197c18d6d40d9477a8e9a2d74a83b0e2

  • SHA256

    9d3380ee1ccaae63ca9f39e86630ffe877d0e3ecb711d87dc02350922595dc84

  • SHA512

    2dbd601a564f7ffc1609bfb05ed55d57afb9bdd9bec1e9091deb53fcfa9fa02a7ba59825f2b9c3777d2016d724a8263808331356f569a1ecae585422e040f3be

  • SSDEEP

    12288:GWFI4Hnedq5EL4739r+Xpph6s2V/m2CB9EKS:w4+d747NOChVnCBF

Malware Config

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29155

Targets

    • Target

      9d3380ee1ccaae63ca9f39e86630ffe877d0e3ecb711d87dc02350922595dc84

    • Size

      515KB

    • MD5

      a904ae8b26c7d421140be930266ed425

    • SHA1

      c2e246b9197c18d6d40d9477a8e9a2d74a83b0e2

    • SHA256

      9d3380ee1ccaae63ca9f39e86630ffe877d0e3ecb711d87dc02350922595dc84

    • SHA512

      2dbd601a564f7ffc1609bfb05ed55d57afb9bdd9bec1e9091deb53fcfa9fa02a7ba59825f2b9c3777d2016d724a8263808331356f569a1ecae585422e040f3be

    • SSDEEP

      12288:GWFI4Hnedq5EL4739r+Xpph6s2V/m2CB9EKS:w4+d747NOChVnCBF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks