General

  • Target

    file.exe

  • Size

    217KB

  • Sample

    221123-f9e8gafh91

  • MD5

    da1cd3fb04aa0aacd8a5fa45dff42f2f

  • SHA1

    c9e0ebc98a3a4dad4f868b4ab19935ddc00f3397

  • SHA256

    f7f8331fdca8b5295b827ff019422c7e7cb230b2a44ff55c741cbf76bc3b5921

  • SHA512

    c2d63405bc5dbda5fca1060888b279f9b53c5a313bb186513547cbe2433229c0e8172c5f045edb952882fff5089378de457b1ea42cef1ec293c2aa4eaad0db7b

  • SSDEEP

    3072:Iob4vq60E/oW+24ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwGS:IoUvr0E/oywe2xrjq6O4MJ4bM5Y4+cE

Malware Config

Extracted

Family

redline

Botnet

@madboyza

C2

193.106.191.138:32796

Attributes
  • auth_value

    9bfce7bfb110f8f53d96c7a32c655358

Targets

    • Target

      file.exe

    • Size

      217KB

    • MD5

      da1cd3fb04aa0aacd8a5fa45dff42f2f

    • SHA1

      c9e0ebc98a3a4dad4f868b4ab19935ddc00f3397

    • SHA256

      f7f8331fdca8b5295b827ff019422c7e7cb230b2a44ff55c741cbf76bc3b5921

    • SHA512

      c2d63405bc5dbda5fca1060888b279f9b53c5a313bb186513547cbe2433229c0e8172c5f045edb952882fff5089378de457b1ea42cef1ec293c2aa4eaad0db7b

    • SSDEEP

      3072:Iob4vq60E/oW+24ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwGS:IoUvr0E/oywe2xrjq6O4MJ4bM5Y4+cE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks