General

  • Target

    df16f9d39345c1a3a1ed404fc6a7c3e5482952e4fa36a7913eb3cddc97950d1c

  • Size

    566KB

  • Sample

    220323-g66rpagfe8

  • MD5

    b278d2601750d7ad2090a7801e377396

  • SHA1

    8e4cabd6ffb0c36d89bfb7ee9b7705a7d76fbb9f

  • SHA256

    df16f9d39345c1a3a1ed404fc6a7c3e5482952e4fa36a7913eb3cddc97950d1c

  • SHA512

    41f6afe9f0b429cf5504fefc6ccaaeb00078fce572d16f0ce1cc8caeed9085868f00be4914c61b205269a7e63c5fdc6ea2aa4a638ed7867ace6fe721248c806d

Malware Config

Extracted

Family

redline

Botnet

nam33

C2

103.133.111.182:44839

Attributes
  • auth_value

    8b278c0f8c2de9225b1633fa0e83ddce

Targets

    • Target

      df16f9d39345c1a3a1ed404fc6a7c3e5482952e4fa36a7913eb3cddc97950d1c

    • Size

      566KB

    • MD5

      b278d2601750d7ad2090a7801e377396

    • SHA1

      8e4cabd6ffb0c36d89bfb7ee9b7705a7d76fbb9f

    • SHA256

      df16f9d39345c1a3a1ed404fc6a7c3e5482952e4fa36a7913eb3cddc97950d1c

    • SHA512

      41f6afe9f0b429cf5504fefc6ccaaeb00078fce572d16f0ce1cc8caeed9085868f00be4914c61b205269a7e63c5fdc6ea2aa4a638ed7867ace6fe721248c806d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks