General

  • Target

    b6969d708e819c5eda0b90746eefd85cb8eb083a61f4d235b382ff4e69f55e7b

  • Size

    403KB

  • Sample

    221226-n7ne3ach59

  • MD5

    1a86422339069c130039bc0a77e3885d

  • SHA1

    4fa99027ef988b84454dde0e4f3015be327d0430

  • SHA256

    b6969d708e819c5eda0b90746eefd85cb8eb083a61f4d235b382ff4e69f55e7b

  • SHA512

    2cc155ca8fd1778185383f5e1a2d90b795ce20e2d88ad256b5cd957cf08875c5a173d105a747d8435eaf0ddb6e24a72b15ff3172954973e49d0dce1f90017c65

  • SSDEEP

    6144:QmHrko0wXOC99+mKpymC0a/QuUAOFQSkcF5xfRyAiLWtlYarMis/Sta:QmHrko0wXOC99QgtcF5ZwAJrMi1E

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      b6969d708e819c5eda0b90746eefd85cb8eb083a61f4d235b382ff4e69f55e7b

    • Size

      403KB

    • MD5

      1a86422339069c130039bc0a77e3885d

    • SHA1

      4fa99027ef988b84454dde0e4f3015be327d0430

    • SHA256

      b6969d708e819c5eda0b90746eefd85cb8eb083a61f4d235b382ff4e69f55e7b

    • SHA512

      2cc155ca8fd1778185383f5e1a2d90b795ce20e2d88ad256b5cd957cf08875c5a173d105a747d8435eaf0ddb6e24a72b15ff3172954973e49d0dce1f90017c65

    • SSDEEP

      6144:QmHrko0wXOC99+mKpymC0a/QuUAOFQSkcF5xfRyAiLWtlYarMis/Sta:QmHrko0wXOC99QgtcF5ZwAJrMi1E

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks