General

  • Target

    70123500558ce2dcee6ee1d14f138ecdbf3a7f743c71680b8fca5a254d7dcac5

  • Size

    5.9MB

  • Sample

    211221-mlf87adhcj

  • MD5

    e60167411a3a1f4f125b5f17ab07f064

  • SHA1

    18a5d27a9bf4e6d21a6c4cff57911c2376ad42e7

  • SHA256

    70123500558ce2dcee6ee1d14f138ecdbf3a7f743c71680b8fca5a254d7dcac5

  • SHA512

    6393876ad657e67a484c2461a9ecba1cbea57c9e4a39567302525f49560ceac643d11b7444fa5d6fa47333bde1db10373f3ccd289504ad97f78a26658ecdb95c

Malware Config

Extracted

Family

redline

Botnet

444

C2

31.131.254.105:1498

Targets

    • Target

      70123500558ce2dcee6ee1d14f138ecdbf3a7f743c71680b8fca5a254d7dcac5

    • Size

      5.9MB

    • MD5

      e60167411a3a1f4f125b5f17ab07f064

    • SHA1

      18a5d27a9bf4e6d21a6c4cff57911c2376ad42e7

    • SHA256

      70123500558ce2dcee6ee1d14f138ecdbf3a7f743c71680b8fca5a254d7dcac5

    • SHA512

      6393876ad657e67a484c2461a9ecba1cbea57c9e4a39567302525f49560ceac643d11b7444fa5d6fa47333bde1db10373f3ccd289504ad97f78a26658ecdb95c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks