General

  • Target

    file.exe

  • Size

    1.1MB

  • Sample

    220902-rjd39shef2

  • MD5

    6116093efaf11c46e0302a7400d07bc4

  • SHA1

    7dcbc42b05ee931046fddd110637cabd63e0f013

  • SHA256

    4be018b42359a6b39fd310c13bf0b99108df248ce85415878ca7d59258541b6b

  • SHA512

    2088c50d1f5ebc95064fe0521bb2e737e86223393334c1da031bd8d05aa661eb4364b7c33c287ea8b6ebe7369e2aa9e32ea9da604adbbd4e2d44d893099e67da

  • SSDEEP

    24576:4Hj1RWz3YIYg0bAL7MHK00Ymom21y3nZW/P:+3WLN3WP

Malware Config

Extracted

Family

redline

Botnet

@forceddd_lzt

C2

5.182.36.101:31305

Attributes
  • auth_value

    91ffc3d776bc56b5c410d1adf5648512

Targets

    • Target

      file.exe

    • Size

      1.1MB

    • MD5

      6116093efaf11c46e0302a7400d07bc4

    • SHA1

      7dcbc42b05ee931046fddd110637cabd63e0f013

    • SHA256

      4be018b42359a6b39fd310c13bf0b99108df248ce85415878ca7d59258541b6b

    • SHA512

      2088c50d1f5ebc95064fe0521bb2e737e86223393334c1da031bd8d05aa661eb4364b7c33c287ea8b6ebe7369e2aa9e32ea9da604adbbd4e2d44d893099e67da

    • SSDEEP

      24576:4Hj1RWz3YIYg0bAL7MHK00Ymom21y3nZW/P:+3WLN3WP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks