General

  • Target

    file

  • Size

    217KB

  • Sample

    221123-l6xagadc37

  • MD5

    8660ca63f8ec767ffbc5ed561569a59b

  • SHA1

    681fabcd63d6a982f6a86e44bd04fad943979b0b

  • SHA256

    65bd762c2dd45d442278e1403bb99a14106699d1f74060333693439c189adb87

  • SHA512

    b61200487783285578d2598b97c80ea545a5750f11e4ffb58c82fe4394c3265d88c4e2563f8299693c43aabf5a582c8626cbbfd8bf35a699f109ed1da71a4c34

  • SSDEEP

    3072:ZO4vs90noT7U4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwZS:ZxvS0noUwe2xrjq6O4MJ4bM5Y4+cE

Malware Config

Extracted

Family

redline

Botnet

@madboyza

C2

193.106.191.138:32796

Attributes
  • auth_value

    9bfce7bfb110f8f53d96c7a32c655358

Targets

    • Target

      file

    • Size

      217KB

    • MD5

      8660ca63f8ec767ffbc5ed561569a59b

    • SHA1

      681fabcd63d6a982f6a86e44bd04fad943979b0b

    • SHA256

      65bd762c2dd45d442278e1403bb99a14106699d1f74060333693439c189adb87

    • SHA512

      b61200487783285578d2598b97c80ea545a5750f11e4ffb58c82fe4394c3265d88c4e2563f8299693c43aabf5a582c8626cbbfd8bf35a699f109ed1da71a4c34

    • SSDEEP

      3072:ZO4vs90noT7U4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwZS:ZxvS0noUwe2xrjq6O4MJ4bM5Y4+cE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks