General

  • Target

    9f226243336a6c2150017ca7faa116f9bcb7cb694acc470e3fa1e2cfedba5d8e.exe

  • Size

    4.3MB

  • Sample

    241219-d25r2swjdw

  • MD5

    e6a13f9bc436e5044cf60bec98de08ce

  • SHA1

    0431ccb9dc9a11fd5cdf7d4c6d06690fa63a06c4

  • SHA256

    9f226243336a6c2150017ca7faa116f9bcb7cb694acc470e3fa1e2cfedba5d8e

  • SHA512

    42ffb0c7921d0b11adef6a8629182fdee50063cdbb01b24b7cfcf7d9f8b656a4b3acbdfa2d8746dc19314437cec5f196cd15f839d003423baf17012f41e9df48

  • SSDEEP

    49152:Dkeyje0el3LoloP8msaSDVX9u6kX2wVtIyA9v5Ody8bbbW6AsrfkMx:DJfl8llvaqVX2VtlAD0ssLH

Malware Config

Extracted

Family

redline

Botnet

am

C2

185.215.113.25:13686

Targets

    • Target

      9f226243336a6c2150017ca7faa116f9bcb7cb694acc470e3fa1e2cfedba5d8e.exe

    • Size

      4.3MB

    • MD5

      e6a13f9bc436e5044cf60bec98de08ce

    • SHA1

      0431ccb9dc9a11fd5cdf7d4c6d06690fa63a06c4

    • SHA256

      9f226243336a6c2150017ca7faa116f9bcb7cb694acc470e3fa1e2cfedba5d8e

    • SHA512

      42ffb0c7921d0b11adef6a8629182fdee50063cdbb01b24b7cfcf7d9f8b656a4b3acbdfa2d8746dc19314437cec5f196cd15f839d003423baf17012f41e9df48

    • SSDEEP

      49152:Dkeyje0el3LoloP8msaSDVX9u6kX2wVtIyA9v5Ody8bbbW6AsrfkMx:DJfl8llvaqVX2VtlAD0ssLH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks