General

  • Target

    7205d38870edafe6a3f365ed36f40c9d2bc3fbba7212b468e798ee303f7f4d95

  • Size

    459KB

  • Sample

    220908-m55qwsede4

  • MD5

    750028f3bdc846afcaabf405d26f8728

  • SHA1

    36f3eec803c236cd0803d5f4a1505fa0d00f040a

  • SHA256

    7205d38870edafe6a3f365ed36f40c9d2bc3fbba7212b468e798ee303f7f4d95

  • SHA512

    4b11ed9a5c604babddb05c325625f5c55884a0aa2650a20a63d539925c3d6c4b9b21f56a54941b09b264c584bac4e52bc775779653e4b87ed7dd8e38975119ba

  • SSDEEP

    12288:pdq10Z0KtvusH5nD1UcuQrYvNuuJBAOFMkPLFuS+J:C105nZOQroCWfFul

Malware Config

Extracted

Family

redline

Botnet

1337

C2

78.153.144.6:2510

Attributes
  • auth_value

    b0447922bcbc2eda83260a9e7a638f45

Targets

    • Target

      7205d38870edafe6a3f365ed36f40c9d2bc3fbba7212b468e798ee303f7f4d95

    • Size

      459KB

    • MD5

      750028f3bdc846afcaabf405d26f8728

    • SHA1

      36f3eec803c236cd0803d5f4a1505fa0d00f040a

    • SHA256

      7205d38870edafe6a3f365ed36f40c9d2bc3fbba7212b468e798ee303f7f4d95

    • SHA512

      4b11ed9a5c604babddb05c325625f5c55884a0aa2650a20a63d539925c3d6c4b9b21f56a54941b09b264c584bac4e52bc775779653e4b87ed7dd8e38975119ba

    • SSDEEP

      12288:pdq10Z0KtvusH5nD1UcuQrYvNuuJBAOFMkPLFuS+J:C105nZOQroCWfFul

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks