General

  • Target

    StartGame.exe

  • Size

    1.7MB

  • Sample

    220420-cxfrpadffm

  • MD5

    8e32c4f845306a5c1e6d22a183d0fe2b

  • SHA1

    2219c7732f195f485aa707254648ec4b8be94360

  • SHA256

    f194decd8326a2d08f043bfc5c5bc9b9272def7bd32d4e4bf42f4eb077d3775b

  • SHA512

    b5ea9300d8be9a28fda71136eda36abda16dcb34b55526d8af8a9c8f95c34eebfef9e86d25f465126692c223f814f5504245c78ee722f2c36984861a062af644

Malware Config

Extracted

Family

redline

Botnet

2

C2

65.108.41.163:38151

Attributes
  • auth_value

    8ef2f7e3bf71e827d3411c71c9064440

Targets

    • Target

      StartGame.exe

    • Size

      1.7MB

    • MD5

      8e32c4f845306a5c1e6d22a183d0fe2b

    • SHA1

      2219c7732f195f485aa707254648ec4b8be94360

    • SHA256

      f194decd8326a2d08f043bfc5c5bc9b9272def7bd32d4e4bf42f4eb077d3775b

    • SHA512

      b5ea9300d8be9a28fda71136eda36abda16dcb34b55526d8af8a9c8f95c34eebfef9e86d25f465126692c223f814f5504245c78ee722f2c36984861a062af644

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks