General

  • Target

    e8b5fa83ad370a057b36eba030102a26ea1649112a34371f4a30be9632368b2c

  • Size

    216KB

  • Sample

    221129-pt8phscg5z

  • MD5

    078dc24ac47c8968e2ed7ce92fcc7651

  • SHA1

    cdb984e62eb05edeb9be07e4f838ec2726a63e8f

  • SHA256

    e8b5fa83ad370a057b36eba030102a26ea1649112a34371f4a30be9632368b2c

  • SHA512

    0a9a8bdb4f4957749173a4ec3893f6a21050e91b2d67e425b157d502b47564feb8d737c430388674ea694b2eae04bdadf1313d75057df903e38ced3451d9ff20

  • SSDEEP

    3072:7hbc8yCxsFNcEyyrJ9WU4khLTvPZFzD0yfZNuzK/hRp1d53CDX5dINLqVqU:8CxGNp7FUyf2AhZjwINut

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      e8b5fa83ad370a057b36eba030102a26ea1649112a34371f4a30be9632368b2c

    • Size

      216KB

    • MD5

      078dc24ac47c8968e2ed7ce92fcc7651

    • SHA1

      cdb984e62eb05edeb9be07e4f838ec2726a63e8f

    • SHA256

      e8b5fa83ad370a057b36eba030102a26ea1649112a34371f4a30be9632368b2c

    • SHA512

      0a9a8bdb4f4957749173a4ec3893f6a21050e91b2d67e425b157d502b47564feb8d737c430388674ea694b2eae04bdadf1313d75057df903e38ced3451d9ff20

    • SSDEEP

      3072:7hbc8yCxsFNcEyyrJ9WU4khLTvPZFzD0yfZNuzK/hRp1d53CDX5dINLqVqU:8CxGNp7FUyf2AhZjwINut

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks