General

  • Target

    5dbd3a4c4c908582d25db793f0c490ac.exe

  • Size

    695KB

  • Sample

    221111-hgxm6ahhh7

  • MD5

    5dbd3a4c4c908582d25db793f0c490ac

  • SHA1

    58032cd11ae7958a8c71626fa72eef49dbf583f0

  • SHA256

    e291e795b512467af58f2455f62ae6d3cce66d7d932b5bd2f0a023b5a517e8e4

  • SHA512

    38ceead2db4b5370a9ddaaedf54bc66497df6302b1c6bd8c3047ad706a5795b182d193789aa56ff837f3384f0176ae0018170dd9c4e84ae5107533ecc228c8f2

  • SSDEEP

    12288:GfG4J68IKAIAnA+w2Cf/tUdCEiGKI/HQPU+qW2Y0ZuXXLz5IqgmhdkDG/h0K0iZg:GfG4Q8IKAIA9IEiGK+HQPU+v0Cz0IkmU

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      5dbd3a4c4c908582d25db793f0c490ac.exe

    • Size

      695KB

    • MD5

      5dbd3a4c4c908582d25db793f0c490ac

    • SHA1

      58032cd11ae7958a8c71626fa72eef49dbf583f0

    • SHA256

      e291e795b512467af58f2455f62ae6d3cce66d7d932b5bd2f0a023b5a517e8e4

    • SHA512

      38ceead2db4b5370a9ddaaedf54bc66497df6302b1c6bd8c3047ad706a5795b182d193789aa56ff837f3384f0176ae0018170dd9c4e84ae5107533ecc228c8f2

    • SSDEEP

      12288:GfG4J68IKAIAnA+w2Cf/tUdCEiGKI/HQPU+qW2Y0ZuXXLz5IqgmhdkDG/h0K0iZg:GfG4Q8IKAIA9IEiGK+HQPU+v0Cz0IkmU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks