General

  • Target

    69a994e5ffc5ee8331cfb46f9afb6304dcc57bbe905e361c673f9a4f26f838fc

  • Size

    403KB

  • Sample

    221226-el1ntscd72

  • MD5

    85096ded58b9163ddc21460fbc98632e

  • SHA1

    aa24d8a0180423a9ee9a5c79f3f6d245cc8b3298

  • SHA256

    69a994e5ffc5ee8331cfb46f9afb6304dcc57bbe905e361c673f9a4f26f838fc

  • SHA512

    c4f2977f4787e8f7c38e81fda6808c8b7983d8d5c6e803a21414a90488bb8ced00ce9dbeae57a922afac01720448da0733aef956809b831b059b097cfd49e3a8

  • SSDEEP

    6144:T2P7Eo0YnmWe9+GC0aNCUa/0O0AOY2iTVtsuMSIIJRjN3/Sta:T2P7Eo0YnmWe9cKvZ9HLJRgE

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      69a994e5ffc5ee8331cfb46f9afb6304dcc57bbe905e361c673f9a4f26f838fc

    • Size

      403KB

    • MD5

      85096ded58b9163ddc21460fbc98632e

    • SHA1

      aa24d8a0180423a9ee9a5c79f3f6d245cc8b3298

    • SHA256

      69a994e5ffc5ee8331cfb46f9afb6304dcc57bbe905e361c673f9a4f26f838fc

    • SHA512

      c4f2977f4787e8f7c38e81fda6808c8b7983d8d5c6e803a21414a90488bb8ced00ce9dbeae57a922afac01720448da0733aef956809b831b059b097cfd49e3a8

    • SSDEEP

      6144:T2P7Eo0YnmWe9+GC0aNCUa/0O0AOY2iTVtsuMSIIJRjN3/Sta:T2P7Eo0YnmWe9cKvZ9HLJRgE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks