General

  • Target

    5c762e43a8894a74249b7db0eded67453ac96c216a10cda8e7beca238293bac4

  • Size

    18KB

  • Sample

    221007-gvgnesbhhm

  • MD5

    61f45eab008bcde3e3a3c063772aab2f

  • SHA1

    667d79cb382b6a92961092b909bb28b749c5bf24

  • SHA256

    5c762e43a8894a74249b7db0eded67453ac96c216a10cda8e7beca238293bac4

  • SHA512

    ea214fe31980a4cd7c69e5daab1116f8ade305782fe16362955781c27b5dc0892a4c92b48f01708bf643dc3675afd14d31cb9f7df3f8e5db7a8daac7de044a8c

  • SSDEEP

    384:gvPrXa1QI+oDOOniW2G6iW4nwgsbPeajCtLoQAiub8L:4Ta1QI3DOsiW2GybNjCV/dub8L

Malware Config

Extracted

Family

redline

C2

185.186.142.127:17355

Attributes
  • auth_value

    2d7be1ed915f7e5f91af0977d4175cb7

Extracted

Family

redline

Botnet

@moriwWs

C2

litrazalilibe.xyz:81

Attributes
  • auth_value

    c2f987b4e6cd55ad1315311e92563eca

Extracted

Family

redline

Botnet

h

C2

185.106.92.139:16578

Attributes
  • auth_value

    d5aafe5ab67bae4a3f7cda3b2e30f9b7

Targets

    • Target

      5c762e43a8894a74249b7db0eded67453ac96c216a10cda8e7beca238293bac4

    • Size

      18KB

    • MD5

      61f45eab008bcde3e3a3c063772aab2f

    • SHA1

      667d79cb382b6a92961092b909bb28b749c5bf24

    • SHA256

      5c762e43a8894a74249b7db0eded67453ac96c216a10cda8e7beca238293bac4

    • SHA512

      ea214fe31980a4cd7c69e5daab1116f8ade305782fe16362955781c27b5dc0892a4c92b48f01708bf643dc3675afd14d31cb9f7df3f8e5db7a8daac7de044a8c

    • SSDEEP

      384:gvPrXa1QI+oDOOniW2G6iW4nwgsbPeajCtLoQAiub8L:4Ta1QI3DOsiW2GybNjCV/dub8L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks