General

  • Target

    73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5

  • Size

    113KB

  • Sample

    221123-zfejmafg8z

  • MD5

    cfb12db0d6b37db0c4fa46a465a7f990

  • SHA1

    883c0c1a32158f557be43638be21f45df17f0d45

  • SHA256

    e40634e7ee65750dadf7ca200624e668bd7533bea25c815d4d10d67531752008

  • SHA512

    307337c5943a7f5593ee68763f00a2e31fbab10fb2bbe413f00165424a1b5c3c86824fff8a42eff6197884aac5158496d594f82f61b293f1dec94a1a43975714

  • SSDEEP

    3072:fgKQDb1OcJHH6hY+Z4Tftllb6Gc4uergQ:50OoHHk/Mftrb6GpmQ

Malware Config

Extracted

Family

redline

Botnet

@madboyza

C2

193.106.191.138:32796

Attributes
  • auth_value

    9bfce7bfb110f8f53d96c7a32c655358

Targets

    • Target

      73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5

    • Size

      217KB

    • MD5

      6426198b2789f1d5974088367162a5da

    • SHA1

      2f39387f1821e7487cd3a946a3f592d7b98943a0

    • SHA256

      73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5

    • SHA512

      f6d042b4c5772b257021b1b1bdd636867d3617b78e0c64f86fea83f1101fa14514348108a79f9b4360913b7c6027d2ef46449fa4758bf4b3b758f8e1ff66bf9c

    • SSDEEP

      3072:eA4v790Lox+J4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwVS:e7vZ0Loqwe2xrjq6O4MJ4bM5Y4+cE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks