General

  • Target

    5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852

  • Size

    725KB

  • Sample

    221029-abeldsdcdp

  • MD5

    fd75bb4e9bcd522db40ae5b640eab481

  • SHA1

    50a99237eed19b01f3a3a1973c588ce25242d64b

  • SHA256

    5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852

  • SHA512

    f66d4b393454951df7ab3ce083433f7ddafce145931a3d56d2ff2eafff323d5cd1bbf68f41b0e17aeba67e924db4c2b80366c995aecb25c9bf47ba9b498c7d33

  • SSDEEP

    12288:2yqWCLJ7rGM0rkwIU/g2Nyz/DJVHEiuhNoKpGJ082AG9rt6VOuKUsSQwiYbDMAv6:2jWCLgM0rkwIbZEikNrpGJN2XzMiqLE

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Targets

    • Target

      5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852

    • Size

      725KB

    • MD5

      fd75bb4e9bcd522db40ae5b640eab481

    • SHA1

      50a99237eed19b01f3a3a1973c588ce25242d64b

    • SHA256

      5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852

    • SHA512

      f66d4b393454951df7ab3ce083433f7ddafce145931a3d56d2ff2eafff323d5cd1bbf68f41b0e17aeba67e924db4c2b80366c995aecb25c9bf47ba9b498c7d33

    • SSDEEP

      12288:2yqWCLJ7rGM0rkwIU/g2Nyz/DJVHEiuhNoKpGJ082AG9rt6VOuKUsSQwiYbDMAv6:2jWCLgM0rkwIbZEikNrpGJN2XzMiqLE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks