General

  • Target

    7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46

  • Size

    119KB

  • Sample

    230102-xe6klsfc67

  • MD5

    bbb33bb9e00d5e7ef58aab221947e918

  • SHA1

    12e620f5b24b8911c8ee7ab2874bfd12355ebc59

  • SHA256

    7465c7141dd27e19081342e2e184fbd93d4be7ac073264975543667fe5a0c3d8

  • SHA512

    e094365e42099ce170d3e5277943eb5074238a4e8d3aefa9d14ad433de38cf1c41982ba292fa4107a5226c4ffbd4395c008049c4446410d4c016b8c934123eb2

  • SSDEEP

    3072:RCKLe9hf9tnR0Kui+res/aQi7DkITyG9W5NxrXVfnoKc8aSo:wIe9hVbp+rxSQi7DDTvu/tPVo

Malware Config

Extracted

Family

redline

Botnet

pub1

C2

89.22.231.25:45245

Attributes
  • auth_value

    9c5c8480222ae57e3bcdac11c63a526d

Targets

    • Target

      7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46

    • Size

      277KB

    • MD5

      f4f6384db371bd510205622328b608d2

    • SHA1

      120fb865d34b4d3681457d34ca16bf1991e976d8

    • SHA256

      7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46

    • SHA512

      029acd8e5d3ab32a295ce253f48575b3e5d11ce957962c47b37ee2ae34e2027af7463cc253f270327201b85d3a72bbdf397c885fad81260c4545d70217683c4a

    • SSDEEP

      6144:NiSAGT+Z6EDT6ezC3pR6EIdOm2WaWeRuWO5WOmujl7KCE1eCVUBXV8qUX:NiSAGT+ZY3eEIdOm2WaWeRuWO5WOmulm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks