General

  • Target

    4166e18c7fd477f49df50800f77f4c5328ac8ecb5ab561a2031061312fe4c59a

  • Size

    27KB

  • Sample

    220701-fjpdfschdj

  • MD5

    81f50fe47ac1b8b6f31be0b0f131c985

  • SHA1

    6f13ad3a8edc7cdc1420eeca600c3614bb23ddb6

  • SHA256

    4166e18c7fd477f49df50800f77f4c5328ac8ecb5ab561a2031061312fe4c59a

  • SHA512

    3b2a3703f6a0482cb3e013ccc236fd1af3434faf5b9644695aa18c017c3b5e735bee0ea53f1860802385388b1c885772ef1aa42694b449cb43200599be6a4f34

Malware Config

Extracted

Family

redline

Botnet

build

C2

172.93.213.137:7525

Targets

    • Target

      4166e18c7fd477f49df50800f77f4c5328ac8ecb5ab561a2031061312fe4c59a

    • Size

      27KB

    • MD5

      81f50fe47ac1b8b6f31be0b0f131c985

    • SHA1

      6f13ad3a8edc7cdc1420eeca600c3614bb23ddb6

    • SHA256

      4166e18c7fd477f49df50800f77f4c5328ac8ecb5ab561a2031061312fe4c59a

    • SHA512

      3b2a3703f6a0482cb3e013ccc236fd1af3434faf5b9644695aa18c017c3b5e735bee0ea53f1860802385388b1c885772ef1aa42694b449cb43200599be6a4f34

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks