General

  • Target

    uctdmt.7z

  • Size

    92KB

  • Sample

    250107-sw5x7awrhy

  • MD5

    8945e5bc2d9be6add636cab240ce85dd

  • SHA1

    1e2608c7676e63cb8c8ff93a596bca24daa7fcfd

  • SHA256

    8b1a72ae96ec1e3c4caa8ae727de9eeb23988ff5689babc9c8e162a77af7908a

  • SHA512

    58a4d1c53b9b0993558ca5459d16a0ec8cb34451fb1e999b02f3c53c72c6048a64fbf4c8caf80ebe723614d7f107bd9ef1f332bb6ca240da72b2e3df931b40a6

  • SSDEEP

    1536:eBJS46G+R82S+Zkwgjt8YpYPLNkljg7mtyGGASsy7ij6q1g4eBHRpQvcMfxUerc1:ecLR8QIt8YpKNkljaFASsy7c6q1xRcnV

Malware Config

Extracted

Family

redline

Botnet

FJCX

C2

185.81.68.147:1912

Targets

    • Target

      uctdmt.7z

    • Size

      92KB

    • MD5

      8945e5bc2d9be6add636cab240ce85dd

    • SHA1

      1e2608c7676e63cb8c8ff93a596bca24daa7fcfd

    • SHA256

      8b1a72ae96ec1e3c4caa8ae727de9eeb23988ff5689babc9c8e162a77af7908a

    • SHA512

      58a4d1c53b9b0993558ca5459d16a0ec8cb34451fb1e999b02f3c53c72c6048a64fbf4c8caf80ebe723614d7f107bd9ef1f332bb6ca240da72b2e3df931b40a6

    • SSDEEP

      1536:eBJS46G+R82S+Zkwgjt8YpYPLNkljg7mtyGGASsy7ij6q1g4eBHRpQvcMfxUerc1:ecLR8QIt8YpKNkljaFASsy7c6q1xRcnV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Target

      spycleaner.exe

    • Size

      300KB

    • MD5

      ae16de1c6c9e15f640b4d4b04310c4be

    • SHA1

      0c8cf3050320256cbdcc32691f38181ec71a700e

    • SHA256

      3e1fd18a294c1e2903cce49b29b42fe5669043c6f4a7f2b4bae865b7cbc0169e

    • SHA512

      e42b0cd82857484ed0a796c767fd7c9cfdef637d6fba9759be52c124c90eea69f0a19a10bdaf2f17efaabb2e9ee69a9f771a3f3fc394c5b79cc89462f1351f37

    • SSDEEP

      3072:2cZqf7D341p/0+mAIkygIQQUgWsB1fA0PuTVAtkxzE/3RoeqiOL2bBOA:2cZqf7DIvnyjPB1fA0GTV8k6oL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks