General

  • Target

    db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2

  • Size

    138KB

  • Sample

    221205-r6kjkadd31

  • MD5

    a7cabb3adf4a82ad242e0cf77488568f

  • SHA1

    e25e2e68b02c7211d885db289414d16b9c914daf

  • SHA256

    8a0b9dfcc98c253cdc1e2d4624998da564191dfea9bda32544fea846e1bcc3c8

  • SHA512

    6d2e91316b0c5fbb70053ee3ce3d8556923f2149a7b20280f879eaebbab9b2c1c3f2d9c5b9336cf3652545a608184ca6b5b1b9f9b06acf254be1e98a26d8ec8d

  • SSDEEP

    3072:kxo5C6CW0rgtz/cBKwboUOrfHj1KdmTCLXaYkQn2E8/M2ivx:co5Cs0u/clvOLGmTCLOQnuoZ

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2

    • Size

      217KB

    • MD5

      21bee8d6428f46a7dcc0e7bfbdacfb60

    • SHA1

      cabd4498b70ac810190db2fcaa8cbf509095d844

    • SHA256

      db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2

    • SHA512

      089581fc39553328b3c3734fd8bb0673e2de6125ffc134f4efec745eb18f2896b13602b758e81189c27e6d7a38da3c92b12b923f617bc1dad81fd84d8aff4012

    • SSDEEP

      3072:3liRuiFzW0qu7b4ee8fwmGzPMWxS+bsqLCX3knb95IcWdXCY9bTAIrFldi0cEIxO:3liRuwNveMwTDM4RVCkbSCY9fQEL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks