General

  • Target

    d41616bde75488b052087f40f04389eab3e5c44a76406ad5b30e411241108207

  • Size

    2.4MB

  • Sample

    221101-nhl6psccfp

  • MD5

    aee35d0a2d6f213a24abada5eeda60b2

  • SHA1

    56e4ef81cf384b4b2e8506154f1d14e153d83153

  • SHA256

    d41616bde75488b052087f40f04389eab3e5c44a76406ad5b30e411241108207

  • SHA512

    4535f3246c013e349efecf6d9305318a164aa4245b8774385874a8a4bbe7d99220c4bd6d4996bcdb0372271e77e9b8ae6a2ea620fd636f236b0869486e48f416

  • SSDEEP

    24576:FG0zA3QYfYrt4bROMNplDZ5xZf3+sDuy0onTOMiR9YLVZ/egkl3RuQ55313o:XAiQusDfTTOMiR9Yol3m

Malware Config

Extracted

Family

redline

C2

185.215.113.55:15912

Attributes
  • auth_value

    6d70cc35fe94a68e01aed71b7f58e62a

Targets

    • Target

      d41616bde75488b052087f40f04389eab3e5c44a76406ad5b30e411241108207

    • Size

      2.4MB

    • MD5

      aee35d0a2d6f213a24abada5eeda60b2

    • SHA1

      56e4ef81cf384b4b2e8506154f1d14e153d83153

    • SHA256

      d41616bde75488b052087f40f04389eab3e5c44a76406ad5b30e411241108207

    • SHA512

      4535f3246c013e349efecf6d9305318a164aa4245b8774385874a8a4bbe7d99220c4bd6d4996bcdb0372271e77e9b8ae6a2ea620fd636f236b0869486e48f416

    • SSDEEP

      24576:FG0zA3QYfYrt4bROMNplDZ5xZf3+sDuy0onTOMiR9YLVZ/egkl3RuQ55313o:XAiQusDfTTOMiR9Yol3m

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks