General

  • Target

    9a69d3fe71b919383bee912449afdc5decbe41077bd8cb93e4a4190447c80dc7

  • Size

    203KB

  • Sample

    220907-n6ndnshcbm

  • MD5

    dd8decfb466f9ef7fb9e5288346d95fa

  • SHA1

    cedaa5c9f993bf0d5ce9c92b788d6f9daeedf558

  • SHA256

    9a69d3fe71b919383bee912449afdc5decbe41077bd8cb93e4a4190447c80dc7

  • SHA512

    2e5285cca27dc4dee4c2e37ea77b1a20ba401a4c4eaeae0c7fe464ce0e5e4421c46bb8ebf0c66a40f1b25c973a159d288d75e2ad9dae13f317402cfe3b8ae343

  • SSDEEP

    3072:1eUOwgbhnXT1XFjXoPkbBNfpVgKUkqX/MbstM+TDPuKocsFgOci+55ONBHZlLib/:1sw2nXp9zSKUkqXScsuOEONB5Vibtp

Malware Config

Extracted

Family

redline

Botnet

747

C2

78.153.144.6:2510

Attributes
  • auth_value

    842e51893ada92572d9bc2e846237976

Targets

    • Target

      9a69d3fe71b919383bee912449afdc5decbe41077bd8cb93e4a4190447c80dc7

    • Size

      203KB

    • MD5

      dd8decfb466f9ef7fb9e5288346d95fa

    • SHA1

      cedaa5c9f993bf0d5ce9c92b788d6f9daeedf558

    • SHA256

      9a69d3fe71b919383bee912449afdc5decbe41077bd8cb93e4a4190447c80dc7

    • SHA512

      2e5285cca27dc4dee4c2e37ea77b1a20ba401a4c4eaeae0c7fe464ce0e5e4421c46bb8ebf0c66a40f1b25c973a159d288d75e2ad9dae13f317402cfe3b8ae343

    • SSDEEP

      3072:1eUOwgbhnXT1XFjXoPkbBNfpVgKUkqX/MbstM+TDPuKocsFgOci+55ONBHZlLib/:1sw2nXp9zSKUkqXScsuOEONB5Vibtp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks