General

  • Target

    fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a

  • Size

    723KB

  • Sample

    221024-tgwxeaheg2

  • MD5

    d420769874e19f6f02fe22507b392c8b

  • SHA1

    e88fbd7db111fc7f13247b1ba1240587bccf7f7f

  • SHA256

    fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a

  • SHA512

    86e4812b9ef01fceecddaeca3b6c3c73ce774e3cd44164dd7abd960d2946246b2fd26e65334920c4405dcfbad450a6dfcdb51a2cde3a00cb7d2c6c17181f491e

  • SSDEEP

    12288:CQfr2Y0TpkxujvEBBmUQEI2yEiThYvTEGJ0wJ69TV6VBuKU64ZgM+WLgm:CQfrT0TpkxuI2EidYbEGJdaVDCWz

Malware Config

Extracted

Family

redline

Botnet

slovarikinstalls

C2

78.153.144.3:2510

Attributes
  • auth_value

    5f80b2ec82e3bd02a08a3a55d3180551

Targets

    • Target

      fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a

    • Size

      723KB

    • MD5

      d420769874e19f6f02fe22507b392c8b

    • SHA1

      e88fbd7db111fc7f13247b1ba1240587bccf7f7f

    • SHA256

      fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a

    • SHA512

      86e4812b9ef01fceecddaeca3b6c3c73ce774e3cd44164dd7abd960d2946246b2fd26e65334920c4405dcfbad450a6dfcdb51a2cde3a00cb7d2c6c17181f491e

    • SSDEEP

      12288:CQfr2Y0TpkxujvEBBmUQEI2yEiThYvTEGJ0wJ69TV6VBuKU64ZgM+WLgm:CQfrT0TpkxuI2EidYbEGJdaVDCWz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks