General

  • Target

    2eb435e7827a8260b08a29a03e4652b6.exe

  • Size

    173KB

  • Sample

    221124-zyv94aaa57

  • MD5

    2eb435e7827a8260b08a29a03e4652b6

  • SHA1

    218f5646d1443f4e46bba7709ba79298ab288328

  • SHA256

    5af62720d9119f381d88dc30ef6e7a71aca7428f4ad54721f1ffa253a1231546

  • SHA512

    510da9fb18b83eeeef3c0f917da3788601ca4fb6f14c0b5e92c1e8574c6ee7ce4817d4454db4e7b18be2725b7636b4d8a8a1a4de2cb500a6d7444d03a5c1d9c7

  • SSDEEP

    3072:VfOoAcE+GtMBCTk7yq0LtE1bUEaehKackNo/6:VfOoI+GtMB1WtE1bdC7kN

Malware Config

Extracted

Family

redline

C2

79.137.192.9:19788

Attributes
  • auth_value

    d7d6e6b0afe836c96a3aee94b2b51dd3

Targets

    • Target

      2eb435e7827a8260b08a29a03e4652b6.exe

    • Size

      173KB

    • MD5

      2eb435e7827a8260b08a29a03e4652b6

    • SHA1

      218f5646d1443f4e46bba7709ba79298ab288328

    • SHA256

      5af62720d9119f381d88dc30ef6e7a71aca7428f4ad54721f1ffa253a1231546

    • SHA512

      510da9fb18b83eeeef3c0f917da3788601ca4fb6f14c0b5e92c1e8574c6ee7ce4817d4454db4e7b18be2725b7636b4d8a8a1a4de2cb500a6d7444d03a5c1d9c7

    • SSDEEP

      3072:VfOoAcE+GtMBCTk7yq0LtE1bUEaehKackNo/6:VfOoI+GtMB1WtE1bdC7kN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks