General

  • Target

    ddb5b14d502b25d0411c8110fef6f8e80ef96abf364d6072660837e82c795b1c.exe

  • Size

    323KB

  • Sample

    250207-2jy4jsspeq

  • MD5

    4d4c69e5b9d84b4f0ec439fa8348dc4f

  • SHA1

    9ee7fdc8c7cef357baa77c09415cacf6ef7dda42

  • SHA256

    ddb5b14d502b25d0411c8110fef6f8e80ef96abf364d6072660837e82c795b1c

  • SHA512

    8858a847c0f2f348df3123463f04085fb200797464c95f74e8164430e86ed8e290658be9f68617cc30691c83993c5779cc7c8c93dfeb874ada6dd2cb6831bc0c

  • SSDEEP

    6144:lrvtOTA5UND824FvWDLFCkBlN0jVlM6tIzDW+9lEnQ2m3iIc:jOTAKNDx4FvWH8kB8jnM6tIW+/EnQ2B

Malware Config

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      ddb5b14d502b25d0411c8110fef6f8e80ef96abf364d6072660837e82c795b1c.exe

    • Size

      323KB

    • MD5

      4d4c69e5b9d84b4f0ec439fa8348dc4f

    • SHA1

      9ee7fdc8c7cef357baa77c09415cacf6ef7dda42

    • SHA256

      ddb5b14d502b25d0411c8110fef6f8e80ef96abf364d6072660837e82c795b1c

    • SHA512

      8858a847c0f2f348df3123463f04085fb200797464c95f74e8164430e86ed8e290658be9f68617cc30691c83993c5779cc7c8c93dfeb874ada6dd2cb6831bc0c

    • SSDEEP

      6144:lrvtOTA5UND824FvWDLFCkBlN0jVlM6tIzDW+9lEnQ2m3iIc:jOTAKNDx4FvWH8kB8jnM6tIW+/EnQ2B

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks