General

  • Target

    287573018d6b07b5b32fcffc63b9aa017740e4bf

  • Size

    6.2MB

  • Sample

    230102-x4gmsafg69

  • MD5

    7854eb17b45359996f52750494cb074c

  • SHA1

    287573018d6b07b5b32fcffc63b9aa017740e4bf

  • SHA256

    7a62100d2ed5e4d93d235b30136ef5bad3ab08d0618354aacb521206ff268ff7

  • SHA512

    b21d2e62e0d1c9da1ee084d2dfd137540493d1974a962853a40b95854c5c37ccfe1ae5ad29adbf0341afaeedd86ffceff81f0aaa608f41e4c8a7cb9ac17a3830

  • SSDEEP

    98304:hPVjSBqqI7eS4zgoy8KiB7+7G/spBBjYjoECUqbtMv:Tr4y8DxAG/sBBj9HUOK

Malware Config

Extracted

Family

redline

Botnet

UniverseCity101

C2

80.89.228.168:5007

Attributes
  • auth_value

    638ab234d171305d6eb5c29368e6c632

Targets

    • Target

      287573018d6b07b5b32fcffc63b9aa017740e4bf

    • Size

      6.2MB

    • MD5

      7854eb17b45359996f52750494cb074c

    • SHA1

      287573018d6b07b5b32fcffc63b9aa017740e4bf

    • SHA256

      7a62100d2ed5e4d93d235b30136ef5bad3ab08d0618354aacb521206ff268ff7

    • SHA512

      b21d2e62e0d1c9da1ee084d2dfd137540493d1974a962853a40b95854c5c37ccfe1ae5ad29adbf0341afaeedd86ffceff81f0aaa608f41e4c8a7cb9ac17a3830

    • SSDEEP

      98304:hPVjSBqqI7eS4zgoy8KiB7+7G/spBBjYjoECUqbtMv:Tr4y8DxAG/sBBj9HUOK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks