General

  • Target

    87e2a2bde61f533bf3616de31a2996e8750a5c37d677036b6a3a8de1dd24bbf8

  • Size

    277KB

  • Sample

    230102-el4qgsdd66

  • MD5

    cba8587e6152a7facf4adda766f1f0cc

  • SHA1

    dc38b43ec07f1f7727e9a663914b07ad590b0580

  • SHA256

    87e2a2bde61f533bf3616de31a2996e8750a5c37d677036b6a3a8de1dd24bbf8

  • SHA512

    fc319ac044997ac8cc1ed67f5d53a956800d2a5c3d415026b208e9b9e4d21965a636da878e640514d7f1895ab1f0f1032c3d817aef122178df335b4644c42a81

  • SSDEEP

    3072:K3DJ0ADKLyLGAZzIXBVWIMekVAngc13iaeVQjE2ELs07SfRO7hOD0IB4lX:2d30yLGaaBVSeku/eVQQY07Zy0fX

Malware Config

Extracted

Family

redline

Botnet

pub2

C2

89.22.231.25:45245

Attributes
  • auth_value

    ea9464d486a641bb513057e5f63399e1

Targets

    • Target

      87e2a2bde61f533bf3616de31a2996e8750a5c37d677036b6a3a8de1dd24bbf8

    • Size

      277KB

    • MD5

      cba8587e6152a7facf4adda766f1f0cc

    • SHA1

      dc38b43ec07f1f7727e9a663914b07ad590b0580

    • SHA256

      87e2a2bde61f533bf3616de31a2996e8750a5c37d677036b6a3a8de1dd24bbf8

    • SHA512

      fc319ac044997ac8cc1ed67f5d53a956800d2a5c3d415026b208e9b9e4d21965a636da878e640514d7f1895ab1f0f1032c3d817aef122178df335b4644c42a81

    • SSDEEP

      3072:K3DJ0ADKLyLGAZzIXBVWIMekVAngc13iaeVQjE2ELs07SfRO7hOD0IB4lX:2d30yLGaaBVSeku/eVQQY07Zy0fX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks