General

  • Target

    d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255

  • Size

    403KB

  • Sample

    221226-jxg33sfg51

  • MD5

    9997129d3e41ae79381957203470b051

  • SHA1

    96dedfa4c05585d8d957a80a6dc816424fc60308

  • SHA256

    d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255

  • SHA512

    2e1664c8bab30869775ef59a53cc29ae418866a4974ce9a8014b0918694eb10bdd7d76646156d6b731057e897846d8f70c86f0fe4581d72117a4d08a4e61788b

  • SSDEEP

    6144:hHNZ37xo0++Wa/Jcupbq4C4a/bn0AON8r4nxNkvlLD8AKtE7al1z/Sta:hHf7xo0++Wa/JXvCGSv1YCm1mE

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255

    • Size

      403KB

    • MD5

      9997129d3e41ae79381957203470b051

    • SHA1

      96dedfa4c05585d8d957a80a6dc816424fc60308

    • SHA256

      d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255

    • SHA512

      2e1664c8bab30869775ef59a53cc29ae418866a4974ce9a8014b0918694eb10bdd7d76646156d6b731057e897846d8f70c86f0fe4581d72117a4d08a4e61788b

    • SSDEEP

      6144:hHNZ37xo0++Wa/Jcupbq4C4a/bn0AON8r4nxNkvlLD8AKtE7al1z/Sta:hHf7xo0++Wa/JXvCGSv1YCm1mE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks