General

  • Target

    3b334f5be40db0d3591a36a7f63c768f.exe

  • Size

    91KB

  • Sample

    210425-5qcsb61gha

  • MD5

    3b334f5be40db0d3591a36a7f63c768f

  • SHA1

    3373642d7ddbd24ce5a4781874f3be27825cd3ad

  • SHA256

    c7d5dd0beceb52c4fff552eaaabea06762ef25df633576867798137dbfe8dc8d

  • SHA512

    5949336ef32be032297a69f73fa3e11e464581afe5c495c972a2ee35c1699465d0317f151948d252ec64887fb76bb6886fff3f1383b57cfa902acc239eb96980

Malware Config

Extracted

Family

redline

Botnet

3

C2

ureltodwie.xyz:80

Targets

    • Target

      3b334f5be40db0d3591a36a7f63c768f.exe

    • Size

      91KB

    • MD5

      3b334f5be40db0d3591a36a7f63c768f

    • SHA1

      3373642d7ddbd24ce5a4781874f3be27825cd3ad

    • SHA256

      c7d5dd0beceb52c4fff552eaaabea06762ef25df633576867798137dbfe8dc8d

    • SHA512

      5949336ef32be032297a69f73fa3e11e464581afe5c495c972a2ee35c1699465d0317f151948d252ec64887fb76bb6886fff3f1383b57cfa902acc239eb96980

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks