General

  • Target

    de6cfcbf92e5b6ddd7b18c96a150f85d76cf57d456d3f3277cff4d804e1b8d59

  • Size

    5.9MB

  • Sample

    211220-echfwsacem

  • MD5

    9230bfe605cb9f137e9c7f581473e0e0

  • SHA1

    a53314a5846cf0ef10ae265c65222635569df125

  • SHA256

    de6cfcbf92e5b6ddd7b18c96a150f85d76cf57d456d3f3277cff4d804e1b8d59

  • SHA512

    aefdbea343ad07edd3e93bbe9ba6ba66dd24bebfad1d286c84c729d8edbb52f12c350ea9ab9cb22bee60b1a6cce9d01cc01032914f9c5c8dd15ee36d6afdbdb1

Malware Config

Extracted

Family

redline

Botnet

444

C2

31.131.254.105:1498

Targets

    • Target

      de6cfcbf92e5b6ddd7b18c96a150f85d76cf57d456d3f3277cff4d804e1b8d59

    • Size

      5.9MB

    • MD5

      9230bfe605cb9f137e9c7f581473e0e0

    • SHA1

      a53314a5846cf0ef10ae265c65222635569df125

    • SHA256

      de6cfcbf92e5b6ddd7b18c96a150f85d76cf57d456d3f3277cff4d804e1b8d59

    • SHA512

      aefdbea343ad07edd3e93bbe9ba6ba66dd24bebfad1d286c84c729d8edbb52f12c350ea9ab9cb22bee60b1a6cce9d01cc01032914f9c5c8dd15ee36d6afdbdb1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks