General

  • Target

    762681ff1c033531e8ad438083b08e38ad11ce7b1e7f006eac33d64e1aef3004

  • Size

    239KB

  • Sample

    221205-s59bzagc8t

  • MD5

    712e5d6615c936f949340bd4ecfae257

  • SHA1

    8db49a4048b3f5daeb75f2e814c7d0aadd8bc08a

  • SHA256

    762681ff1c033531e8ad438083b08e38ad11ce7b1e7f006eac33d64e1aef3004

  • SHA512

    8a1dcc53dbfcfac209262a07d80d1d1a02c1a41c48e397e9245f7a14519eed365cd78d3029a128c51b350b7d0af028d92733c323201ed1517daeeb2d2d05005c

  • SSDEEP

    3072:hx+Wgbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATczmwxO:hx+WgWg5Kq+PwQoHp0DoK2KJSTfqrhmL

Malware Config

Extracted

Family

redline

Botnet

@P1

C2

193.106.191.138:32796

Attributes
  • auth_value

    54c79ce081122137049ee07c0a2f38ab

Targets

    • Target

      762681ff1c033531e8ad438083b08e38ad11ce7b1e7f006eac33d64e1aef3004

    • Size

      239KB

    • MD5

      712e5d6615c936f949340bd4ecfae257

    • SHA1

      8db49a4048b3f5daeb75f2e814c7d0aadd8bc08a

    • SHA256

      762681ff1c033531e8ad438083b08e38ad11ce7b1e7f006eac33d64e1aef3004

    • SHA512

      8a1dcc53dbfcfac209262a07d80d1d1a02c1a41c48e397e9245f7a14519eed365cd78d3029a128c51b350b7d0af028d92733c323201ed1517daeeb2d2d05005c

    • SSDEEP

      3072:hx+Wgbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATczmwxO:hx+WgWg5Kq+PwQoHp0DoK2KJSTfqrhmL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks