General

  • Target

    e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778

  • Size

    2.3MB

  • Sample

    221029-ebphtabaer

  • MD5

    40e711d3488dcc665a790ed0e59ad118

  • SHA1

    9724a6fa4737ffb1696d83d35fd1cd0b3282464d

  • SHA256

    e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778

  • SHA512

    759ebe33918d9721cbdeabe14d04014e676a2de029f068164ac178d7042974a1c660a2ad6c32e91f2f09d2821854201cafd14780996b6edbfaacf5e2c43fc5fd

  • SSDEEP

    49152:xy0Ri/S6AJ9fcSPiVCTcQoY0uLTDkoanJFWm85ciCxWO5Om:xy0Ri/S6AJ9fcGiVEBBLTQnjpSCkir

Malware Config

Extracted

Family

redline

Botnet

1310

C2

79.137.192.57:48771

Attributes
  • auth_value

    feb5f5c29913f32658637e553762a40e

Targets

    • Target

      e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778

    • Size

      2.3MB

    • MD5

      40e711d3488dcc665a790ed0e59ad118

    • SHA1

      9724a6fa4737ffb1696d83d35fd1cd0b3282464d

    • SHA256

      e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778

    • SHA512

      759ebe33918d9721cbdeabe14d04014e676a2de029f068164ac178d7042974a1c660a2ad6c32e91f2f09d2821854201cafd14780996b6edbfaacf5e2c43fc5fd

    • SSDEEP

      49152:xy0Ri/S6AJ9fcSPiVCTcQoY0uLTDkoanJFWm85ciCxWO5Om:xy0Ri/S6AJ9fcGiVEBBLTQnjpSCkir

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks