General

  • Target

    0f4351c43a09cb581dc01fe0ec08ff83.exe

  • Size

    1.6MB

  • Sample

    220708-ynnxlaefdq

  • MD5

    0f4351c43a09cb581dc01fe0ec08ff83

  • SHA1

    07c96d4348f195664d7cc90e575d2496c5c43389

  • SHA256

    02989f6664dd6098efe0d9717187cd57fd2ab9d7c1fc9fd8d49817aa81d80caa

  • SHA512

    833521582677534fca40e901b242800ae121aef017b159b22a99a4b86dab53addfd0437c78f7bdd1b76396b9367f3cb98120c540906887525c71a2707940ec17

Malware Config

Extracted

Family

redline

Botnet

DEF

C2

185.17.0.63:34397

Attributes
  • auth_value

    e225781d52614e08d9f06fbdb5071be6

Targets

    • Target

      0f4351c43a09cb581dc01fe0ec08ff83.exe

    • Size

      1.6MB

    • MD5

      0f4351c43a09cb581dc01fe0ec08ff83

    • SHA1

      07c96d4348f195664d7cc90e575d2496c5c43389

    • SHA256

      02989f6664dd6098efe0d9717187cd57fd2ab9d7c1fc9fd8d49817aa81d80caa

    • SHA512

      833521582677534fca40e901b242800ae121aef017b159b22a99a4b86dab53addfd0437c78f7bdd1b76396b9367f3cb98120c540906887525c71a2707940ec17

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks