General

  • Target

    35eb9ec64a57f6bc8538e6b1425acd4e62258739f862ab0512fdee87833abbbe.exe

  • Size

    219KB

  • Sample

    221115-fbn3qaeh92

  • MD5

    3909b9ed45fa12da69baef270c9bfd7a

  • SHA1

    0c39dead3d4bea45b822d5124309a93552f280b3

  • SHA256

    35eb9ec64a57f6bc8538e6b1425acd4e62258739f862ab0512fdee87833abbbe

  • SHA512

    7071204182b509c1bd6e7ee3543bae638aae70843853bc323c32b3cb7ff3b9c25daa9b7ca50f75ab6dfac45aff29c6b3c079025aa485f6990a6843ad84356dee

  • SSDEEP

    6144:hSzKTGOWNf1mwyB3W1mwyB3Ab/NJg0eNyq/Fz+ysn4KyNRH:hSzKTGOWNf1mwyB3W1mwyB3Abg0GFz+7

Malware Config

Extracted

Family

redline

Botnet

1

C2

45.15.156.86:37262

Attributes
  • auth_value

    763971fede4a949ad0f10cedebea0963

Targets

    • Target

      35eb9ec64a57f6bc8538e6b1425acd4e62258739f862ab0512fdee87833abbbe.exe

    • Size

      219KB

    • MD5

      3909b9ed45fa12da69baef270c9bfd7a

    • SHA1

      0c39dead3d4bea45b822d5124309a93552f280b3

    • SHA256

      35eb9ec64a57f6bc8538e6b1425acd4e62258739f862ab0512fdee87833abbbe

    • SHA512

      7071204182b509c1bd6e7ee3543bae638aae70843853bc323c32b3cb7ff3b9c25daa9b7ca50f75ab6dfac45aff29c6b3c079025aa485f6990a6843ad84356dee

    • SSDEEP

      6144:hSzKTGOWNf1mwyB3W1mwyB3Ab/NJg0eNyq/Fz+ysn4KyNRH:hSzKTGOWNf1mwyB3W1mwyB3Abg0GFz+7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks