General

  • Target

    NFT Museum launcher.zip

  • Size

    971KB

  • Sample

    221201-rrbm4sga84

  • MD5

    0bafb291a567d94fa4ecbe2336fc4ea6

  • SHA1

    38551836206d60463a2492ae4743d48778039954

  • SHA256

    775b6ab14e87ed5849e038d11fe3154bbfe5915a74449aea3048e04ef0d6ccef

  • SHA512

    64417bf5e357165bf4d4c0149ab50c3c6cc3098dd3b784e3fa84672be82a54c318fc8aa5d80c5858328933413506d465c3843db74387a925206a7e84667b01cf

  • SSDEEP

    6144:+tuoEWwcjb1wjyqK2lIcEFwI0rkC+WLkogUM2KfpaXKG:upEvMw8WLTvM2K6

Malware Config

Extracted

Family

redline

Botnet

bendji$Celodon

C2

167.235.233.35:16621

Attributes
  • auth_value

    fdd44841f30966a11a8cae8d553b5e88

Targets

    • Target

      NFT Museum launcher.exe

    • Size

      700.5MB

    • MD5

      7527020877e19451d08a3c157d4cdd7c

    • SHA1

      8e28315735c56aec7ddc5b9ef08b25262a1b7f76

    • SHA256

      708b22a7b3c87320301ba5a98f0759bbf0f9728066003cb1b2bb87124e32c346

    • SHA512

      2e8dfd1b5a4dd07aab891bdc0ec363ef9d9f2780f777f4c2453369e71d6397b5f33ec8eed4221241682c7a62aa31a92e015e019787482a3ccbaaaedf10adbef7

    • SSDEEP

      12288:0DosEVBJgHIN4eDhgWrXVSS8Nob3LShMCO+vFH:0DEVBJgHIN4eDhgaXYNoTLSuCLvFH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks