General

  • Target

    cba7efe86366a06afcaf30ffc25d0652bfeb1a179c5aaa90621537560e24a392

  • Size

    2.6MB

  • Sample

    221003-j881yaeha4

  • MD5

    fcc31bb8dd044f6b46db858f1bdc590f

  • SHA1

    0be774425e100c7549de22def94f29691df429fe

  • SHA256

    cba7efe86366a06afcaf30ffc25d0652bfeb1a179c5aaa90621537560e24a392

  • SHA512

    b1ffb960489adea858e29954ebc34dba3d7a06f652a49f144bd3fdf3eb299e45ca0c4c33e22d8b8bd7fd31d915b0bdde679ff5cd7eba40c41212fb5381326f81

  • SSDEEP

    49152:QbicWQFO8aZk9QTT0RQs2lpbfgFfQlKmI5l3g:QbicWQFO8QkKf0RQs2vfgFfQllV

Malware Config

Extracted

Family

redline

Botnet

1200654767

C2

79.137.192.6:8362

Targets

    • Target

      cba7efe86366a06afcaf30ffc25d0652bfeb1a179c5aaa90621537560e24a392

    • Size

      2.6MB

    • MD5

      fcc31bb8dd044f6b46db858f1bdc590f

    • SHA1

      0be774425e100c7549de22def94f29691df429fe

    • SHA256

      cba7efe86366a06afcaf30ffc25d0652bfeb1a179c5aaa90621537560e24a392

    • SHA512

      b1ffb960489adea858e29954ebc34dba3d7a06f652a49f144bd3fdf3eb299e45ca0c4c33e22d8b8bd7fd31d915b0bdde679ff5cd7eba40c41212fb5381326f81

    • SSDEEP

      49152:QbicWQFO8aZk9QTT0RQs2lpbfgFfQlKmI5l3g:QbicWQFO8QkKf0RQs2vfgFfQllV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks