General

  • Target

    4c207bce926efb535bb745c93bef1d74adfea7d0451f81fb48c678b1178d71c6

  • Size

    1.1MB

  • Sample

    220915-gmmjpscae8

  • MD5

    bfde857f58b339dc052d20942cfec82d

  • SHA1

    dcced573fc78f4bdcfe7cc6d4d4a462e2781d114

  • SHA256

    4c207bce926efb535bb745c93bef1d74adfea7d0451f81fb48c678b1178d71c6

  • SHA512

    72a98d0861433cad7eefd2ac0d643488528c6366f49e0a31573a95db0e87ac66756ca62432df52ce99bda84f63484d503b48d9d54602a7c5f40a1241b32f4960

  • SSDEEP

    24576:LIfdfYfYKKx7eoBlMvgRYn0UvlrbthqgOVKvA:LIR2RbCAvA

Malware Config

Extracted

Family

redline

Botnet

5201435440

C2

79.137.192.6:8362

Targets

    • Target

      4c207bce926efb535bb745c93bef1d74adfea7d0451f81fb48c678b1178d71c6

    • Size

      1.1MB

    • MD5

      bfde857f58b339dc052d20942cfec82d

    • SHA1

      dcced573fc78f4bdcfe7cc6d4d4a462e2781d114

    • SHA256

      4c207bce926efb535bb745c93bef1d74adfea7d0451f81fb48c678b1178d71c6

    • SHA512

      72a98d0861433cad7eefd2ac0d643488528c6366f49e0a31573a95db0e87ac66756ca62432df52ce99bda84f63484d503b48d9d54602a7c5f40a1241b32f4960

    • SSDEEP

      24576:LIfdfYfYKKx7eoBlMvgRYn0UvlrbthqgOVKvA:LIR2RbCAvA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks