General

  • Target

    tmp

  • Size

    248KB

  • Sample

    221102-w2awsaddcp

  • MD5

    18ec6f65d276ea2173b26e7ca013190e

  • SHA1

    f24d95a1069ccbde30ece236d72c7553689c890b

  • SHA256

    5d5e9a03a29d4e638a175b889a5bb73fbcb0809ac83aa6966324fe86ac408d17

  • SHA512

    33e2c237be627d032d9b1db91aa8446b06b9526f55dffc68c8eec55aedd6a747f2231dc1a4ab730590bb1a4407136b78ff6fa472643078b03dc665f781e31573

  • SSDEEP

    3072:QScNYLAzJ+bENfhy6Fw+UVVgq/qipjvVBN1s1KeVyFCbC4KZxaJVYYPwiofG/7c:4/dgENPHip5BE1k6KZxowikG/7c

Malware Config

Extracted

Family

redline

Botnet

1

C2

107.182.129.73:21733

Attributes
  • auth_value

    3a5bb0917495b4312d052a0b8977d2bb

Targets

    • Target

      tmp

    • Size

      248KB

    • MD5

      18ec6f65d276ea2173b26e7ca013190e

    • SHA1

      f24d95a1069ccbde30ece236d72c7553689c890b

    • SHA256

      5d5e9a03a29d4e638a175b889a5bb73fbcb0809ac83aa6966324fe86ac408d17

    • SHA512

      33e2c237be627d032d9b1db91aa8446b06b9526f55dffc68c8eec55aedd6a747f2231dc1a4ab730590bb1a4407136b78ff6fa472643078b03dc665f781e31573

    • SSDEEP

      3072:QScNYLAzJ+bENfhy6Fw+UVVgq/qipjvVBN1s1KeVyFCbC4KZxaJVYYPwiofG/7c:4/dgENPHip5BE1k6KZxowikG/7c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks