General

  • Target

    c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b.zip

  • Size

    116KB

  • Sample

    221113-rdpb2see31

  • MD5

    18454f097a8f799ba5cd526b68f5b63b

  • SHA1

    e8a00675b6ef2720db81627184ff4cf64be784b0

  • SHA256

    6670a4b2c190c5dbe7ac8002e1403af0c423df7c1747da8a3c7445f44faee38e

  • SHA512

    8d8b74b842840621576909984f3cd00626427fc6a63db88c2329a4182b91ad0e1b038f22aa11a3523bd512686627ceb474d8daacabd39ccfb44bb7330dac26a4

  • SSDEEP

    3072:Lev4uP4JNapL/nLFmdD27OCYBdrX2Hs+fHd03s8n:qv4Pg/IfBtc8n

Malware Config

Extracted

Family

redline

Botnet

4

C2

176.124.201.56:25784

Attributes
  • auth_value

    1f101d9c1105a19254187500b2403d48

Targets

    • Target

      c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b.exe

    • Size

      282KB

    • MD5

      df9005eaec4232a802cb205ddafce262

    • SHA1

      90a545934efd744c7314d90d749f7249ddc40011

    • SHA256

      c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b

    • SHA512

      e1f61d7280f58c68c823ee82d74ffa56a7d59ac229754a39721f9396bdc2a9b5ddc29ac927fb4618cd8fe6387392f9bee20f79f8047741f8b9cac662e91dd4e7

    • SSDEEP

      6144:7pLDN9eNbG2OeBdfvcMtamj7EVYDWKgoAK0lT:7pLDN9eM27/qQW8ANl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks