General

  • Target

    d173bb70e924eaf2d7fe85606769051218b371ff8cc99c8d6b107470f4476ef6

  • Size

    1.7MB

  • Sample

    221025-ng72sacebn

  • MD5

    e992b8395277e9c0b6d69c928fc92146

  • SHA1

    31b6f0c6de342cec7efd3a62e671116ddd6158a2

  • SHA256

    d173bb70e924eaf2d7fe85606769051218b371ff8cc99c8d6b107470f4476ef6

  • SHA512

    6d9fb610cfaa0fe31415528295343b12686d461ecbdf94cb9fcf320b303b8a47d6f93e5dec8717d3ef5b14896876f567faa6688d9ce55a9636210ce7e4b82205

  • SSDEEP

    49152:Af28jbCTgA9bOu3vLm+cUaTFw5rbZl4m9e:Af28jbED9bVvLDuwhj4F

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Targets

    • Target

      d173bb70e924eaf2d7fe85606769051218b371ff8cc99c8d6b107470f4476ef6

    • Size

      1.7MB

    • MD5

      e992b8395277e9c0b6d69c928fc92146

    • SHA1

      31b6f0c6de342cec7efd3a62e671116ddd6158a2

    • SHA256

      d173bb70e924eaf2d7fe85606769051218b371ff8cc99c8d6b107470f4476ef6

    • SHA512

      6d9fb610cfaa0fe31415528295343b12686d461ecbdf94cb9fcf320b303b8a47d6f93e5dec8717d3ef5b14896876f567faa6688d9ce55a9636210ce7e4b82205

    • SSDEEP

      49152:Af28jbCTgA9bOu3vLm+cUaTFw5rbZl4m9e:Af28jbED9bVvLDuwhj4F

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks