General

  • Target

    5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9

  • Size

    54KB

  • Sample

    220623-rdspgagba4

  • MD5

    bf3f098255fe2c23b9135409652e72c2

  • SHA1

    a8ec905d04c72ec2fa4099fafa2fc29caa8749a7

  • SHA256

    5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9

  • SHA512

    67dee018ca82b424d6607f79a2978a2727d08b1ca0495b6099eb2b493d5981d7b9c98d8adeba10272208ea7136339d239733b997636554179dda6771cf3fa9ee

Malware Config

Extracted

Family

redline

Botnet

kista

C2

65.108.27.131:45256

Attributes
  • auth_value

    4573bf97dc6f0f5ec522dbf1c8c7410e

Targets

    • Target

      5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9

    • Size

      54KB

    • MD5

      bf3f098255fe2c23b9135409652e72c2

    • SHA1

      a8ec905d04c72ec2fa4099fafa2fc29caa8749a7

    • SHA256

      5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9

    • SHA512

      67dee018ca82b424d6607f79a2978a2727d08b1ca0495b6099eb2b493d5981d7b9c98d8adeba10272208ea7136339d239733b997636554179dda6771cf3fa9ee

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks