General

  • Target

    file.exe

  • Size

    2.6MB

  • Sample

    220918-n9qyzabbg3

  • MD5

    ea2ee29a1a67528d3e2d67aea4bedf84

  • SHA1

    a419ed97bb40aa727f6d37b5f951328e06b0c0f6

  • SHA256

    301dfd9b9e2dc5fc852d25e53cea283c36fee20e7cbc608d9c28858084a90992

  • SHA512

    6b4e56eac83bb1fac23a3836aa318112078def274d5e8a4115b922ff8162b7dbc4bbcd7b784d3865cb190b5f459b4d8db0da49ab0488b750f2e6b7db0df280e4

  • SSDEEP

    24576:K+3F6ZICERHY7Y0aISdaMMKcJo8YXLBzeQVaLcShCN/gITL/jKLLzh19Bl3RuQ50:K+3F6ICETtYLcUITL/jKb/l3W

Malware Config

Extracted

Family

redline

Botnet

@forceddd_lzt

C2

5.182.36.101:31305

Attributes
  • auth_value

    91ffc3d776bc56b5c410d1adf5648512

Targets

    • Target

      file.exe

    • Size

      2.6MB

    • MD5

      ea2ee29a1a67528d3e2d67aea4bedf84

    • SHA1

      a419ed97bb40aa727f6d37b5f951328e06b0c0f6

    • SHA256

      301dfd9b9e2dc5fc852d25e53cea283c36fee20e7cbc608d9c28858084a90992

    • SHA512

      6b4e56eac83bb1fac23a3836aa318112078def274d5e8a4115b922ff8162b7dbc4bbcd7b784d3865cb190b5f459b4d8db0da49ab0488b750f2e6b7db0df280e4

    • SSDEEP

      24576:K+3F6ZICERHY7Y0aISdaMMKcJo8YXLBzeQVaLcShCN/gITL/jKLLzh19Bl3RuQ50:K+3F6ICETtYLcUITL/jKb/l3W

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks