General

  • Target

    abacca218986209482f20ed9772c4cf4.exe

  • Size

    787KB

  • Sample

    221129-hw34gsag3w

  • MD5

    abacca218986209482f20ed9772c4cf4

  • SHA1

    2398f39d3a0007ed0fbb5af7a26e4ccce249af9f

  • SHA256

    a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d

  • SHA512

    5a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6

  • SSDEEP

    12288:aRyl9Dlkb72176sw/umQ6mGiBEswKK31OtUb0tx4H2cdI54XuHTnY6A0Zre:ayl9xkb72176s+o431Oab0tx4Wj4Z

Malware Config

Extracted

Family

redline

Botnet

new2811

C2

jamesmillion.xyz:15772

Attributes
  • auth_value

    86a08d2c48d5c5db0c9cb371fb180937

Targets

    • Target

      abacca218986209482f20ed9772c4cf4.exe

    • Size

      787KB

    • MD5

      abacca218986209482f20ed9772c4cf4

    • SHA1

      2398f39d3a0007ed0fbb5af7a26e4ccce249af9f

    • SHA256

      a404da44d49619445b10db9dad87e04456aa18ec88e9fc9ee328e40d8bbf479d

    • SHA512

      5a834ae01248f8aac8aa198435d9fb71da3d26fcc23cd66faf1d29dc85a8bdb56464aed336494ea51eef8258fed08ba93cea3bf0f9882961bb4e40d20144afd6

    • SSDEEP

      12288:aRyl9Dlkb72176sw/umQ6mGiBEswKK31OtUb0tx4H2cdI54XuHTnY6A0Zre:ayl9xkb72176s+o431Oab0tx4Wj4Z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks