General

  • Target

    UIExecutor5 (extract.me).zip

  • Size

    357KB

  • Sample

    241205-b3ssrsxnbp

  • MD5

    fdb4957f50015ea1eb5ab20d2e4d9790

  • SHA1

    cf6fb361a7816ab2fe31ef309494c7c4a19baa67

  • SHA256

    6e15cb9828c0d8889e1df6b864a028fbe1796d0eac994742c856eede388b3004

  • SHA512

    1698f3cd53dcbd2714b3519801474e6607396982e9487a1457c580af42b146fb99c199bdc35227af00cf115438356e4cbc3bb65a951ca0d44ca9205b770a6cbe

  • SSDEEP

    6144:7X/e/Qoip/zkB9A7y8pA8TEvLHYkp7AR5XiYn99qNEM/giTYeQhBHNTO7Y:SQxRzK9qyoA8UhyX/3kh/evTOE

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Targets

    • Target

      UIExecutor.exe

    • Size

      309KB

    • MD5

      36497d4c1167dbc149eb57b5fe6044e3

    • SHA1

      9ed6239965c840db34b4fa5ee134b4919784e28e

    • SHA256

      26a17ccebe008bc2a21fd18d272048c8f786bf4c7ec9f2e51e877e55c8a03507

    • SHA512

      4304217cf60397251be732b79f200a2053a19442bac70eb5ca6a2ed60274b6e2de1d47fe5222481a3c0488463df0b15510e3987ff722fc651df20f056c339d2a

    • SSDEEP

      6144:8ny1kZFA7y+p+8LEvLHOepFAR5XOQnj9CNEWXgiLYeQhvHNTE7:8nyUFqy6+827yXVJMpXg1TE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks