General

  • Target

    0605d280d1fc970793dedb4c5d6bf22d7c152a8fa8a29e9889b06227447b7334

  • Size

    2.4MB

  • Sample

    220705-vl57babbdr

  • MD5

    b14f231f114ac38952412596c08c133c

  • SHA1

    56349d3c410401e5abdd04f86aa61bbbc03f10d9

  • SHA256

    0605d280d1fc970793dedb4c5d6bf22d7c152a8fa8a29e9889b06227447b7334

  • SHA512

    e04d02319018caa8bf3d665cfd0bb7884699bd863aa3ec63091beaad7db7e3833456264fdb9fbe139b4aa1256451ee61a9a66ddf51b74daa4c30c405dd196b55

Malware Config

Extracted

Family

redline

C2

141.95.140.173:33470

Attributes
  • auth_value

    2ff48322710c330d79d5df704f21ffd8

Targets

    • Target

      0605d280d1fc970793dedb4c5d6bf22d7c152a8fa8a29e9889b06227447b7334

    • Size

      2.4MB

    • MD5

      b14f231f114ac38952412596c08c133c

    • SHA1

      56349d3c410401e5abdd04f86aa61bbbc03f10d9

    • SHA256

      0605d280d1fc970793dedb4c5d6bf22d7c152a8fa8a29e9889b06227447b7334

    • SHA512

      e04d02319018caa8bf3d665cfd0bb7884699bd863aa3ec63091beaad7db7e3833456264fdb9fbe139b4aa1256451ee61a9a66ddf51b74daa4c30c405dd196b55

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks