General

  • Target

    ade08092a0b54cb25d340f9cf7f01fee0f3de0e074fcd8ab23ac5c2c12b9e7e9

  • Size

    341KB

  • Sample

    250206-d47z7a1nes

  • MD5

    df111dbabe042512dbbe0d4b348286a9

  • SHA1

    b1aafdb56666e3258d39d445203ffcf8a88b5c4c

  • SHA256

    ade08092a0b54cb25d340f9cf7f01fee0f3de0e074fcd8ab23ac5c2c12b9e7e9

  • SHA512

    4c28d5d04e1e154865be2dfde70748ecd7cb705db3ba69f26dfc294e710d166c412abe25b89fdfe5bdb7bc543b11c80ece9973b8e2041bf999cc78b535598544

  • SSDEEP

    6144:0KvMPoSmuqCWbxR9E+kcYAXGq9pedEMGinUEFa3RuyUiH/har:BO7mTfbxR9EfNAheeGnUEQ3USfcr

Malware Config

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      ade08092a0b54cb25d340f9cf7f01fee0f3de0e074fcd8ab23ac5c2c12b9e7e9

    • Size

      341KB

    • MD5

      df111dbabe042512dbbe0d4b348286a9

    • SHA1

      b1aafdb56666e3258d39d445203ffcf8a88b5c4c

    • SHA256

      ade08092a0b54cb25d340f9cf7f01fee0f3de0e074fcd8ab23ac5c2c12b9e7e9

    • SHA512

      4c28d5d04e1e154865be2dfde70748ecd7cb705db3ba69f26dfc294e710d166c412abe25b89fdfe5bdb7bc543b11c80ece9973b8e2041bf999cc78b535598544

    • SSDEEP

      6144:0KvMPoSmuqCWbxR9E+kcYAXGq9pedEMGinUEFa3RuyUiH/har:BO7mTfbxR9EfNAheeGnUEQ3USfcr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks