General

  • Target

    e3b5a1d9b403f5bfc5945578789a16f159458cd26f773701ab4eadc0c9ad8e26

  • Size

    1.2MB

  • Sample

    250123-ktt4xatnbp

  • MD5

    4f521fcc825fa3495e3df86be69e19e1

  • SHA1

    5efda68c4476ef8f996c8cbfa468c6b870a2d036

  • SHA256

    e3b5a1d9b403f5bfc5945578789a16f159458cd26f773701ab4eadc0c9ad8e26

  • SHA512

    742bfc10361d42e9ac2219fb453dfe7112b1d66ada55912bf0529a1e7467b48e15b18c237859fe93294beac5d725e104a0f05e363a2adf852f1fd99ca10f2293

  • SSDEEP

    24576:FQS9c3O718GXEHLS2iQ8KVbHmzqksGxn3T2B9rB:eO718GXZ+8c3G9qB

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Targets

    • Target

      e3b5a1d9b403f5bfc5945578789a16f159458cd26f773701ab4eadc0c9ad8e26

    • Size

      1.2MB

    • MD5

      4f521fcc825fa3495e3df86be69e19e1

    • SHA1

      5efda68c4476ef8f996c8cbfa468c6b870a2d036

    • SHA256

      e3b5a1d9b403f5bfc5945578789a16f159458cd26f773701ab4eadc0c9ad8e26

    • SHA512

      742bfc10361d42e9ac2219fb453dfe7112b1d66ada55912bf0529a1e7467b48e15b18c237859fe93294beac5d725e104a0f05e363a2adf852f1fd99ca10f2293

    • SSDEEP

      24576:FQS9c3O718GXEHLS2iQ8KVbHmzqksGxn3T2B9rB:eO718GXZ+8c3G9qB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.