General

  • Target

    c0631d14f4a74e5dad6e48521c9838d3cf291396a6d5be583e2d14920f4f9285.exe

  • Size

    365KB

  • Sample

    250208-ne8wastjcm

  • MD5

    5c2bf2e317807c650b9049bf69e6e0de

  • SHA1

    745343192be97ab8534551e64b88398a91af7c44

  • SHA256

    c0631d14f4a74e5dad6e48521c9838d3cf291396a6d5be583e2d14920f4f9285

  • SHA512

    116b427822c728e44f2dcc2cafac8d8e94aa792c7bf67d266e4b340e359740eee6bbd421fd0d8b408566bf16032b1b7f48d3bcf5bd8ab6fa8c1a12e3f276e5c4

  • SSDEEP

    3072:gokN1jz7yTZjD7CaVT7yFrvSwAlvwz9xmBihXUH8RLrbsW0bCtjUuIYyGVKA6m2b:goA9yTZjD7VsDZxegXUH8Rpxn2m666I4

Malware Config

Extracted

Family

redline

Botnet

@swagseasoon

C2

37.220.87.8:42823

Attributes
  • auth_value

    bfc2903da4ada2bec8e5446f6bfa75a6

Targets

    • Target

      c0631d14f4a74e5dad6e48521c9838d3cf291396a6d5be583e2d14920f4f9285.exe

    • Size

      365KB

    • MD5

      5c2bf2e317807c650b9049bf69e6e0de

    • SHA1

      745343192be97ab8534551e64b88398a91af7c44

    • SHA256

      c0631d14f4a74e5dad6e48521c9838d3cf291396a6d5be583e2d14920f4f9285

    • SHA512

      116b427822c728e44f2dcc2cafac8d8e94aa792c7bf67d266e4b340e359740eee6bbd421fd0d8b408566bf16032b1b7f48d3bcf5bd8ab6fa8c1a12e3f276e5c4

    • SSDEEP

      3072:gokN1jz7yTZjD7CaVT7yFrvSwAlvwz9xmBihXUH8RLrbsW0bCtjUuIYyGVKA6m2b:goA9yTZjD7VsDZxegXUH8Rpxn2m666I4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks