General

  • Target

    8a95e56175bce4963f07e4d6fcbb0a1391546903678f60ad9d6ca1cea4630934

  • Size

    723KB

  • Sample

    221025-jwksksbhhq

  • MD5

    419a7040f0dec224ab28afa9f4b71484

  • SHA1

    e96c1ca2a55742899a34980ddf1ce24442b08238

  • SHA256

    8a95e56175bce4963f07e4d6fcbb0a1391546903678f60ad9d6ca1cea4630934

  • SHA512

    e82df4c9501bff1e263139ebfff7c7a45eadaa9cb10896e338e368aef30ff4846302d824e0405f30179bcdcc5ba9c9f8525df0600209c3a8416b9d76fa4579cd

  • SSDEEP

    12288:AQfr2uULJ0Z8jFYbs4BmUQEI2yEicRhvzUOR0Wh6tLaaV5uyUiq3lHaaTbOOpHPU:AQfrtULJ0Z8pHEi2h7UOR76adHaaTbOX

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      8a95e56175bce4963f07e4d6fcbb0a1391546903678f60ad9d6ca1cea4630934

    • Size

      723KB

    • MD5

      419a7040f0dec224ab28afa9f4b71484

    • SHA1

      e96c1ca2a55742899a34980ddf1ce24442b08238

    • SHA256

      8a95e56175bce4963f07e4d6fcbb0a1391546903678f60ad9d6ca1cea4630934

    • SHA512

      e82df4c9501bff1e263139ebfff7c7a45eadaa9cb10896e338e368aef30ff4846302d824e0405f30179bcdcc5ba9c9f8525df0600209c3a8416b9d76fa4579cd

    • SSDEEP

      12288:AQfr2uULJ0Z8jFYbs4BmUQEI2yEicRhvzUOR0Wh6tLaaV5uyUiq3lHaaTbOOpHPU:AQfrtULJ0Z8pHEi2h7UOR76adHaaTbOX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks