General

  • Target

    f5336efef1b72316122a027eea5657a9742654c7924b3bc8852a18c50f62e20f.bin

  • Size

    294KB

  • Sample

    221123-vwfpeaab45

  • MD5

    8c99899c499b98ad45eb5af4d7687ddf

  • SHA1

    2ae45a88bd42e9de2df0af83f35bc60a9af5345b

  • SHA256

    f5336efef1b72316122a027eea5657a9742654c7924b3bc8852a18c50f62e20f

  • SHA512

    e24a0d25387ca9363a053450a5092e35e28afa7cd09a6a7500de2f17176e0928a452235665aff0357be9f976ce46baa959a204fd4160a64894014ef590688325

  • SSDEEP

    6144:x35jAT+iVfmmYC9SraKuMp4KLTFtuRauiT:x3aSiVft9TMp4KnFtuRaui

Malware Config

Extracted

Family

redline

C2

79.137.192.7:39946

Attributes
  • auth_value

    52ceecb848f38969703143a1492660ce

Targets

    • Target

      f5336efef1b72316122a027eea5657a9742654c7924b3bc8852a18c50f62e20f.bin

    • Size

      294KB

    • MD5

      8c99899c499b98ad45eb5af4d7687ddf

    • SHA1

      2ae45a88bd42e9de2df0af83f35bc60a9af5345b

    • SHA256

      f5336efef1b72316122a027eea5657a9742654c7924b3bc8852a18c50f62e20f

    • SHA512

      e24a0d25387ca9363a053450a5092e35e28afa7cd09a6a7500de2f17176e0928a452235665aff0357be9f976ce46baa959a204fd4160a64894014ef590688325

    • SSDEEP

      6144:x35jAT+iVfmmYC9SraKuMp4KLTFtuRauiT:x3aSiVft9TMp4KnFtuRaui

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Stops running service(s)

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks