General

  • Target

    e1b05a75294682db52b6db7f6aab85c9165b4d46f66cd6edb820c049a67c5be4N.exe

  • Size

    314KB

  • Sample

    250208-k8621sxpen

  • MD5

    bcb7d955bb729543a6620d651e19bd30

  • SHA1

    f66bc64abbda83a5478b4a59127138d4151e7940

  • SHA256

    e1b05a75294682db52b6db7f6aab85c9165b4d46f66cd6edb820c049a67c5be4

  • SHA512

    0fe564ca853c1e82292e207815be6479c50ed9eb63fee4b1dcac44411faec980646189d7b488868bc7f071b2a7a7116814f3df8401314b1816c2e439fc707bf9

  • SSDEEP

    6144:T7cg+IvcaH91VuFh4JP4qsPlPxfNpJvnaPlEKsg5aX:ncg+IvcaHbVuQJwqstxHmIgEX

Malware Config

Extracted

Family

redline

Botnet

grom

C2

83.97.73.127:19045

Attributes
  • auth_value

    2193aac8692a5e1ec66d9db9fa25ee00

Targets

    • Target

      e1b05a75294682db52b6db7f6aab85c9165b4d46f66cd6edb820c049a67c5be4N.exe

    • Size

      314KB

    • MD5

      bcb7d955bb729543a6620d651e19bd30

    • SHA1

      f66bc64abbda83a5478b4a59127138d4151e7940

    • SHA256

      e1b05a75294682db52b6db7f6aab85c9165b4d46f66cd6edb820c049a67c5be4

    • SHA512

      0fe564ca853c1e82292e207815be6479c50ed9eb63fee4b1dcac44411faec980646189d7b488868bc7f071b2a7a7116814f3df8401314b1816c2e439fc707bf9

    • SSDEEP

      6144:T7cg+IvcaH91VuFh4JP4qsPlPxfNpJvnaPlEKsg5aX:ncg+IvcaHbVuQJwqstxHmIgEX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks