General

  • Target

    2aa96de34750c6299b33e6c5417f3032627c82d537c44642d49f795e55f10790

  • Size

    244KB

  • Sample

    221112-n6hhesac4w

  • MD5

    7765f8394e933db1f47858252f16f847

  • SHA1

    60474fb4b427dae01c21cd1a465b23f731f5eb8f

  • SHA256

    2aa96de34750c6299b33e6c5417f3032627c82d537c44642d49f795e55f10790

  • SHA512

    9341f0d5fcdeb73a2a2957f032830d5f2aed9a382d6f40c9ce5284d3a528331640fa320878a2f0c63e2d7c96a20fe74e6f53dc71a1cfd720d24807604f6b9492

  • SSDEEP

    6144:hUmnhkRWlYBmwedvbJEJruX/JjEdyADkBGW:BnhkRWEdy6W

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      2aa96de34750c6299b33e6c5417f3032627c82d537c44642d49f795e55f10790

    • Size

      244KB

    • MD5

      7765f8394e933db1f47858252f16f847

    • SHA1

      60474fb4b427dae01c21cd1a465b23f731f5eb8f

    • SHA256

      2aa96de34750c6299b33e6c5417f3032627c82d537c44642d49f795e55f10790

    • SHA512

      9341f0d5fcdeb73a2a2957f032830d5f2aed9a382d6f40c9ce5284d3a528331640fa320878a2f0c63e2d7c96a20fe74e6f53dc71a1cfd720d24807604f6b9492

    • SSDEEP

      6144:hUmnhkRWlYBmwedvbJEJruX/JjEdyADkBGW:BnhkRWEdy6W

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks