General

  • Target

    1fcfd45222bd54b713f9551a7e8637afab5e5474bfe44e6f406b3c292b326335.exe

  • Size

    165KB

  • Sample

    221203-ll6cmsdg6v

  • MD5

    358fd7a024ec262ab65948220065b9c7

  • SHA1

    e4000efe30f2a44d9658a0de8c19ddde72724ecf

  • SHA256

    1fcfd45222bd54b713f9551a7e8637afab5e5474bfe44e6f406b3c292b326335

  • SHA512

    a78b0e9050fb767c1d2e7f4af30da892fd43a5e97c959e72a5898a6e9a661d6843e2cb148eda1548b27a7f499383e7bc66f2a28df737f97b4d00a94219873038

  • SSDEEP

    3072:4gcZX+7+SQr3crc5W2fhICKwpXD/s8ofTdlv+oztppETf3PDbFLEClhQgXKzrA1H:4gccfrc5W2fhUwmm1fQgB1ghHlczh9kc

Malware Config

Extracted

Family

redline

Botnet

Setup

C2

manddarinn.art:81

Attributes
  • auth_value

    a24d744b3fcbfa136d630fcdfd4c2926

Targets

    • Target

      1fcfd45222bd54b713f9551a7e8637afab5e5474bfe44e6f406b3c292b326335.exe

    • Size

      165KB

    • MD5

      358fd7a024ec262ab65948220065b9c7

    • SHA1

      e4000efe30f2a44d9658a0de8c19ddde72724ecf

    • SHA256

      1fcfd45222bd54b713f9551a7e8637afab5e5474bfe44e6f406b3c292b326335

    • SHA512

      a78b0e9050fb767c1d2e7f4af30da892fd43a5e97c959e72a5898a6e9a661d6843e2cb148eda1548b27a7f499383e7bc66f2a28df737f97b4d00a94219873038

    • SSDEEP

      3072:4gcZX+7+SQr3crc5W2fhICKwpXD/s8ofTdlv+oztppETf3PDbFLEClhQgXKzrA1H:4gccfrc5W2fhUwmm1fQgB1ghHlczh9kc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks