General

  • Target

    c0d03be2469451ee5a1fcadfcd8878aa527d18616d26752c730d676e08b07272

  • Size

    341KB

  • Sample

    221026-elkmlsefe2

  • MD5

    9edb6866700422b6119692afd7560f88

  • SHA1

    06d7bf45cae005eb5df7f898fee07a93d2e5e732

  • SHA256

    c0d03be2469451ee5a1fcadfcd8878aa527d18616d26752c730d676e08b07272

  • SHA512

    4ddabb6e02f8c1137e30acd16346b6ce54cc889d6d8a722e773d5957d3a898712c9a41cd6c47986119afc31f95a9a589a4625c1e5f27bfa6b33c2d282253347f

  • SSDEEP

    6144:VMGR5p4oZflvsjew3f+vW5FLUKMAOnDTyVhIwE7LJ81U7BwTd:Fp4oZflvB0vMxTyVjE7LJB7Byd

Malware Config

Extracted

Family

redline

Botnet

nam7

C2

103.89.90.61:34589

Attributes
  • auth_value

    533c8fbdab4382453812c73ea2cee5b8

Targets

    • Target

      c0d03be2469451ee5a1fcadfcd8878aa527d18616d26752c730d676e08b07272

    • Size

      341KB

    • MD5

      9edb6866700422b6119692afd7560f88

    • SHA1

      06d7bf45cae005eb5df7f898fee07a93d2e5e732

    • SHA256

      c0d03be2469451ee5a1fcadfcd8878aa527d18616d26752c730d676e08b07272

    • SHA512

      4ddabb6e02f8c1137e30acd16346b6ce54cc889d6d8a722e773d5957d3a898712c9a41cd6c47986119afc31f95a9a589a4625c1e5f27bfa6b33c2d282253347f

    • SSDEEP

      6144:VMGR5p4oZflvsjew3f+vW5FLUKMAOnDTyVhIwE7LJ81U7BwTd:Fp4oZflvB0vMxTyVjE7LJB7Byd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks