General

  • Target

    da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd

  • Size

    2.4MB

  • Sample

    221101-nk3lgabde4

  • MD5

    31fc2ff39a3c49638f6f650c509deb3f

  • SHA1

    87657e08826225f2c7adbaf9bc2a0a9fc5fd7ccd

  • SHA256

    da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd

  • SHA512

    3294f6f13f2990ca3a1479914aba0ae1da9b3dfe354e37d30809023d66cf0a8f5558556b568c0a7e77fdae5576d35ec638ca7e8bcc7c3acd929db4e49b868dc1

  • SSDEEP

    24576:DM3mEyYcY+lpbgwMAPlKUhqLmNugOhYNyO8BLBk5LkSrWDGIHNe+el3RuQ55313u:MmnkmUO8BLBk5V3l3Q

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    024d191501563555109913dcf3ada91c

Targets

    • Target

      da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd

    • Size

      2.4MB

    • MD5

      31fc2ff39a3c49638f6f650c509deb3f

    • SHA1

      87657e08826225f2c7adbaf9bc2a0a9fc5fd7ccd

    • SHA256

      da7b16b948a62aaf5837f2a4efa59856b3c9b76da79df7b404b1011a99d460cd

    • SHA512

      3294f6f13f2990ca3a1479914aba0ae1da9b3dfe354e37d30809023d66cf0a8f5558556b568c0a7e77fdae5576d35ec638ca7e8bcc7c3acd929db4e49b868dc1

    • SSDEEP

      24576:DM3mEyYcY+lpbgwMAPlKUhqLmNugOhYNyO8BLBk5LkSrWDGIHNe+el3RuQ55313u:MmnkmUO8BLBk5V3l3Q

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks