General

  • Target

    7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4

  • Size

    259KB

  • Sample

    221028-ptcxvafed8

  • MD5

    d3c4224a575201e32dd4a93fd847a315

  • SHA1

    c60dbe76534898c09b20b36d3c8adbeb698c0c58

  • SHA256

    7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4

  • SHA512

    b0a624d72abbdf32cfc8fc96cc01f52a4cb21b4cce834949df3f5c8cc768c4dd323709aa06b61287c4389cf06db738636225b775dd3eb3a90d7adce8e7fdb4bb

  • SSDEEP

    3072:1XOjHCbLJ1AkOwfGZmj592m3CtD4rImbceGuDis+JoqLSidkz0o7/EM/h3m:xoHsLJywuZo34DOImdngeqG4b

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4

    • Size

      259KB

    • MD5

      d3c4224a575201e32dd4a93fd847a315

    • SHA1

      c60dbe76534898c09b20b36d3c8adbeb698c0c58

    • SHA256

      7f8b8d9e3b80d6d422926703cc009e5fc4dedde461be55f895d9cfceee1d1db4

    • SHA512

      b0a624d72abbdf32cfc8fc96cc01f52a4cb21b4cce834949df3f5c8cc768c4dd323709aa06b61287c4389cf06db738636225b775dd3eb3a90d7adce8e7fdb4bb

    • SSDEEP

      3072:1XOjHCbLJ1AkOwfGZmj592m3CtD4rImbceGuDis+JoqLSidkz0o7/EM/h3m:xoHsLJywuZo34DOImdngeqG4b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks