General

  • Target

    FORTNITE HACK.rar

  • Size

    617KB

  • Sample

    221002-ylewxagdd6

  • MD5

    a844a7417663119b0c653a42de6cb76e

  • SHA1

    c84630458595f9d1214a392ae0cce7578c7d772f

  • SHA256

    e7feb0a25f0b34d1831322b44f9e2ba24b35a81858e8e0b1bce5a53e8f7963fa

  • SHA512

    1733b86baa493b4a94d2d2cd1249010d6c60d6db5e0b391972443b46bccf4a61734b7d43b59994a2232340ba6de9b79d2c50254536b60a533264e9b7ee0d0ea3

  • SSDEEP

    12288:UlFHvvFhIkG0ku7QWumLn6isRiZZuhUcyFISAgb89ZvdKHuNPIu:Uvv4N0k7VRifuhUctwqdGcPIu

Malware Config

Extracted

Family

redline

C2

79.137.192.47:46759

Attributes
  • auth_value

    4c6f7085e83e2a75ed59e826b3063bdf

Targets

    • Target

      FORTNITE HACK/hack.exe

    • Size

      2.6MB

    • MD5

      2798dd111bb5ba41704aa80aa7ba8495

    • SHA1

      94310dcca49d3b1bc8d6406c3ed45c731151303c

    • SHA256

      bb681c36d0a64e774ad8eef56c0c60e7fdee0baa9fc45cf2a76d9693f3d6b4b6

    • SHA512

      443f13df806e711bafb741eb856e3108a0d917ca25eb5320628b971d5b1b9abdd7b47ec252cabd87e1993a6ae0369359f4762fabb216acc6cffe09a1e223deba

    • SSDEEP

      24576:7f552H5jE4UUJuPdbIIeHiYSYpVuM1BhMtTdOtMVcPWNOzn4qY2aLPil3RuQ553D:zvmI4UUJuPdsIed4CPcOzn4qYbOl3f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks