General

  • Target

    StartGame.exe

  • Size

    1.9MB

  • Sample

    220427-htlreshbf5

  • MD5

    24742f727c1ba989ad438e82432d635e

  • SHA1

    9157ec7f0dd5e0c775b3ec82d10b38621cbe6b51

  • SHA256

    530b4b29b48310e56608a01c3ad008c9bcbe5e093c0cfe06965feb1222f9f257

  • SHA512

    9631543d733f27c78aa3eb3d0e5e994f5ef4d43b68ded915a78d395a24d626c2d2957885c5355c352f7d9c5a17f91bc5b36d343c228cea3f525d52c467372bf0

Malware Config

Extracted

Family

redline

Botnet

1

C2

65.108.5.252:43673

Attributes
  • auth_value

    95517c2a2f56575288c35d9dfde4a6aa

Targets

    • Target

      StartGame.exe

    • Size

      1.9MB

    • MD5

      24742f727c1ba989ad438e82432d635e

    • SHA1

      9157ec7f0dd5e0c775b3ec82d10b38621cbe6b51

    • SHA256

      530b4b29b48310e56608a01c3ad008c9bcbe5e093c0cfe06965feb1222f9f257

    • SHA512

      9631543d733f27c78aa3eb3d0e5e994f5ef4d43b68ded915a78d395a24d626c2d2957885c5355c352f7d9c5a17f91bc5b36d343c228cea3f525d52c467372bf0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks