General

  • Target

    321b7072a0ea33c36933b98b6523eaf4dead69a8e90dc032f8a4b10cfb835b1e

  • Size

    398KB

  • Sample

    221225-jv8s1sed6x

  • MD5

    bb329fed961e356f7103c804a960e7db

  • SHA1

    5164fa618d677b5208e81de16ab0613aa3fca5f1

  • SHA256

    321b7072a0ea33c36933b98b6523eaf4dead69a8e90dc032f8a4b10cfb835b1e

  • SHA512

    112647e5c8d6989d7906439b610af6fa8d798d577e305912b149c30cec024ba817b8e46b6980ead2f50e9e648219c76d5cbc4d2e50cd53a50cc7f4f4423f2faa

  • SSDEEP

    12288:Gygxer6dluLigEZoNZaMuWANOYzGmzRP7:AuOdZ6ZBuNOLmzh7

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      321b7072a0ea33c36933b98b6523eaf4dead69a8e90dc032f8a4b10cfb835b1e

    • Size

      398KB

    • MD5

      bb329fed961e356f7103c804a960e7db

    • SHA1

      5164fa618d677b5208e81de16ab0613aa3fca5f1

    • SHA256

      321b7072a0ea33c36933b98b6523eaf4dead69a8e90dc032f8a4b10cfb835b1e

    • SHA512

      112647e5c8d6989d7906439b610af6fa8d798d577e305912b149c30cec024ba817b8e46b6980ead2f50e9e648219c76d5cbc4d2e50cd53a50cc7f4f4423f2faa

    • SSDEEP

      12288:Gygxer6dluLigEZoNZaMuWANOYzGmzRP7:AuOdZ6ZBuNOLmzh7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks