General

  • Target

    19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445

  • Size

    341KB

  • Sample

    221026-elm3qsefgq

  • MD5

    7f459661d0481e49a3cacabc7dd1479f

  • SHA1

    589e481cc2ff221609843ac70f6cfd0672a4dbb7

  • SHA256

    19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445

  • SHA512

    742669780885c6fb9bcdc79ab9eb1f47c9b74f8e352c627a53c1de0e3d1d4d4b5671aec66f403d2de9225e315892d42c15cf17b308bf57c38cd25df3142a3a24

  • SSDEEP

    6144:j2x/5p4oZflvsjew3f+vW5FLUKMAO9kfeM8dCD/DPDhRIQ4NJTd:Op4oZflvB0vM5FCHPDi7d

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Targets

    • Target

      19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445

    • Size

      341KB

    • MD5

      7f459661d0481e49a3cacabc7dd1479f

    • SHA1

      589e481cc2ff221609843ac70f6cfd0672a4dbb7

    • SHA256

      19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445

    • SHA512

      742669780885c6fb9bcdc79ab9eb1f47c9b74f8e352c627a53c1de0e3d1d4d4b5671aec66f403d2de9225e315892d42c15cf17b308bf57c38cd25df3142a3a24

    • SSDEEP

      6144:j2x/5p4oZflvsjew3f+vW5FLUKMAO9kfeM8dCD/DPDhRIQ4NJTd:Op4oZflvB0vM5FCHPDi7d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks