General

  • Target

    e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a

  • Size

    725KB

  • Sample

    221029-yry7qsdfcp

  • MD5

    e17ea9a5a3a77e8448ab1d777c86ba18

  • SHA1

    6c4f7b37e8b46d52f7f3dabfe3ea90aa9022c72e

  • SHA256

    e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a

  • SHA512

    bd4f28ec8b43722f2ed6a23236bee418b28d8713c6343dd74bd88698aff6bf6f66afadd448373b4f5007461c17bdd948d699aa31f5249e1a824d445da9b57d84

  • SSDEEP

    12288:ESW8QlniHAXIFEuCbgucz1EaUEikA5EicgZLv0OROZnvtgHuVkuyUxW7rHPPM/o5:ESW8QBKAXIFEuqmcEizr0OROCr/HM

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a

    • Size

      725KB

    • MD5

      e17ea9a5a3a77e8448ab1d777c86ba18

    • SHA1

      6c4f7b37e8b46d52f7f3dabfe3ea90aa9022c72e

    • SHA256

      e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a

    • SHA512

      bd4f28ec8b43722f2ed6a23236bee418b28d8713c6343dd74bd88698aff6bf6f66afadd448373b4f5007461c17bdd948d699aa31f5249e1a824d445da9b57d84

    • SSDEEP

      12288:ESW8QlniHAXIFEuCbgucz1EaUEikA5EicgZLv0OROZnvtgHuVkuyUxW7rHPPM/o5:ESW8QBKAXIFEuqmcEizr0OROCr/HM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks