General

  • Target

    ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024

  • Size

    3.9MB

  • Sample

    220816-16b2vsaaf8

  • MD5

    70c4a1e5ce70e0ec16fc0c6d0f0384d9

  • SHA1

    2533d9a175e8617512fba948557a302c7d4683a2

  • SHA256

    ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024

  • SHA512

    576b48ff847c2fac88d5f48133cc7ce36ddfeccb923fcdcb9847b7a9586cc531b2507557c24bb9889b6a4f7db5b864a5a316136b32c151cce2bae034fda9a89a

  • SSDEEP

    98304:bSmRn0VvVQnmjI8k0LUOUgJ9BouaPkeOgUiBwkcX:WlVyWUiUg7+jO7iBwR

Malware Config

Extracted

Family

redline

C2

193.106.191.160:8673

Attributes
  • auth_value

    a92e5e3459b5f1ea8a76ec4f05c50c1e

Targets

    • Target

      ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024

    • Size

      3.9MB

    • MD5

      70c4a1e5ce70e0ec16fc0c6d0f0384d9

    • SHA1

      2533d9a175e8617512fba948557a302c7d4683a2

    • SHA256

      ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024

    • SHA512

      576b48ff847c2fac88d5f48133cc7ce36ddfeccb923fcdcb9847b7a9586cc531b2507557c24bb9889b6a4f7db5b864a5a316136b32c151cce2bae034fda9a89a

    • SSDEEP

      98304:bSmRn0VvVQnmjI8k0LUOUgJ9BouaPkeOgUiBwkcX:WlVyWUiUg7+jO7iBwR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks