General

  • Target

    d892320496eb3bacb1bb5b35ad0d6110367ab9f5b5b520cecd23f49a68bec036

  • Size

    459KB

  • Sample

    220908-m5k2gsede3

  • MD5

    6ab5827c19543ca19ef7fbbb82291618

  • SHA1

    c57ceb2bbf3f0a6655da2a9f887184eadaf43fd4

  • SHA256

    d892320496eb3bacb1bb5b35ad0d6110367ab9f5b5b520cecd23f49a68bec036

  • SHA512

    de6e1274693d4253e4f289859ca05cc8a0b30565a1e8b51efee57f4dc87bda3bedbc7bd1d667f14ce12d87a2ed80a11b413f555c44751dcd687aae2d881fe735

  • SSDEEP

    12288:/SxUK1EZ0KtvusH5nm1EsOAbIfdueJRTe54bIXc0NGJZaJ:/ST1E5nkOAbItcF

Malware Config

Extracted

Family

redline

Botnet

1337

C2

78.153.144.6:2510

Attributes
  • auth_value

    b0447922bcbc2eda83260a9e7a638f45

Targets

    • Target

      d892320496eb3bacb1bb5b35ad0d6110367ab9f5b5b520cecd23f49a68bec036

    • Size

      459KB

    • MD5

      6ab5827c19543ca19ef7fbbb82291618

    • SHA1

      c57ceb2bbf3f0a6655da2a9f887184eadaf43fd4

    • SHA256

      d892320496eb3bacb1bb5b35ad0d6110367ab9f5b5b520cecd23f49a68bec036

    • SHA512

      de6e1274693d4253e4f289859ca05cc8a0b30565a1e8b51efee57f4dc87bda3bedbc7bd1d667f14ce12d87a2ed80a11b413f555c44751dcd687aae2d881fe735

    • SSDEEP

      12288:/SxUK1EZ0KtvusH5nm1EsOAbIfdueJRTe54bIXc0NGJZaJ:/ST1E5nkOAbItcF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks