General

  • Target

    3ba018d05ade54c651931cfa8b05db844bb8e7a615bfa720b60c2b9bafbdf436

  • Size

    213KB

  • Sample

    221129-hawghsgh2y

  • MD5

    a526c21dc93a1a50e65a816a399f8f7c

  • SHA1

    8cd3d0053011e551e3471cf5da7a54f7f8dfe3f4

  • SHA256

    3ba018d05ade54c651931cfa8b05db844bb8e7a615bfa720b60c2b9bafbdf436

  • SHA512

    c9bf28f4ffaa2d351413994a4f65b279d0b166b5d6deeb8f9688d7077ee003353a1b341bdfb193aa6557e6b49e53c0823028f8d55fc09333d9a198160dedcfaf

  • SSDEEP

    3072:9/AiTL9nFwpFjUrMYyBrJ9WU4khLTvPZFzD0yfZNuzK/hRp1d53CDX5dINLqZq:93L9nOpFjGMb7FUyf2AhZjwINq

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      3ba018d05ade54c651931cfa8b05db844bb8e7a615bfa720b60c2b9bafbdf436

    • Size

      213KB

    • MD5

      a526c21dc93a1a50e65a816a399f8f7c

    • SHA1

      8cd3d0053011e551e3471cf5da7a54f7f8dfe3f4

    • SHA256

      3ba018d05ade54c651931cfa8b05db844bb8e7a615bfa720b60c2b9bafbdf436

    • SHA512

      c9bf28f4ffaa2d351413994a4f65b279d0b166b5d6deeb8f9688d7077ee003353a1b341bdfb193aa6557e6b49e53c0823028f8d55fc09333d9a198160dedcfaf

    • SSDEEP

      3072:9/AiTL9nFwpFjUrMYyBrJ9WU4khLTvPZFzD0yfZNuzK/hRp1d53CDX5dINLqZq:93L9nOpFjGMb7FUyf2AhZjwINq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks