General

  • Target

    505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1

  • Size

    399KB

  • Sample

    221225-nq66vabd92

  • MD5

    0ea45bddb097b50c089bea5ae3f5a6fd

  • SHA1

    4a9755d1e363803087d8f2c77d2c3cc5804196e2

  • SHA256

    505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1

  • SHA512

    f70607e01a2b8fa2d60f54cace041ed12a3610d94f4e30f84b5b7cc7b48ae1c7725eb8aa69ea2aa5d3261bd772d239a7792c7817a0aac46e3e5702cb0184aad5

  • SSDEEP

    6144:p6DCxLT52vMishn5u9OC9ZjYAOkuXFGvNCy7QRO8GjTKXe/kXDN:p6DCxLT52vMiy7yuVfRO/TWN

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1

    • Size

      399KB

    • MD5

      0ea45bddb097b50c089bea5ae3f5a6fd

    • SHA1

      4a9755d1e363803087d8f2c77d2c3cc5804196e2

    • SHA256

      505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1

    • SHA512

      f70607e01a2b8fa2d60f54cace041ed12a3610d94f4e30f84b5b7cc7b48ae1c7725eb8aa69ea2aa5d3261bd772d239a7792c7817a0aac46e3e5702cb0184aad5

    • SSDEEP

      6144:p6DCxLT52vMishn5u9OC9ZjYAOkuXFGvNCy7QRO8GjTKXe/kXDN:p6DCxLT52vMiy7yuVfRO/TWN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks