General

  • Target

    b501be492ef7b03d0131412ee1158575a7a779af61ff60c87cbe55e16f3f8981

  • Size

    145KB

  • Sample

    220920-rbx66sdbd8

  • MD5

    4e103f6646264d34328f014264c5d809

  • SHA1

    0133bc71a9338837778976647c63bc761fba4906

  • SHA256

    b501be492ef7b03d0131412ee1158575a7a779af61ff60c87cbe55e16f3f8981

  • SHA512

    15b874147a7e7bb6b5e43a9fe57a771ba350413bd40e379c2f81303204c2389f88fa593d8fd83ac172632df353736265c82722360e81a09b875ad7e7c9b8224b

  • SSDEEP

    3072:L2YdLm4457po35T+ci0cWgYauqdShy7mBBNx:1L52o3R+QJqDdgy7

Malware Config

Extracted

Family

redline

Botnet

@aavecheckcrypto

C2

5.182.36.101:31305

Attributes
  • auth_value

    cfec012590be0965370e2399924bf33d

Targets

    • Target

      b501be492ef7b03d0131412ee1158575a7a779af61ff60c87cbe55e16f3f8981

    • Size

      145KB

    • MD5

      4e103f6646264d34328f014264c5d809

    • SHA1

      0133bc71a9338837778976647c63bc761fba4906

    • SHA256

      b501be492ef7b03d0131412ee1158575a7a779af61ff60c87cbe55e16f3f8981

    • SHA512

      15b874147a7e7bb6b5e43a9fe57a771ba350413bd40e379c2f81303204c2389f88fa593d8fd83ac172632df353736265c82722360e81a09b875ad7e7c9b8224b

    • SSDEEP

      3072:L2YdLm4457po35T+ci0cWgYauqdShy7mBBNx:1L52o3R+QJqDdgy7

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks