General

  • Target

    9711f85fbe695797579d4d92d1f45d50064e965beb8f0474427d40fc6fc3fc99

  • Size

    354KB

  • Sample

    230104-actrpsge8t

  • MD5

    8be58bd0082837d5d1ce6dbcdc8073ad

  • SHA1

    94a65d5ec4a1a2acfa309f4cc7f29828d30af4fc

  • SHA256

    9711f85fbe695797579d4d92d1f45d50064e965beb8f0474427d40fc6fc3fc99

  • SHA512

    8617c495c710b3a0758483b38e2b1497e60c26f368ac239abc6cebace39ecd454065001031044a283f1ce8b5224c6e60ed60f318461e5944d24773bcb77b09ea

  • SSDEEP

    6144:54VTeo7l77jkCD+1or3VAOMxp5dcQxzJ9wK2cMMQeLF5N:KJeoKHWUxt9RF5

Malware Config

Extracted

Family

redline

Botnet

pub2

C2

89.22.231.25:45245

Attributes
  • auth_value

    ea9464d486a641bb513057e5f63399e1

Targets

    • Target

      9711f85fbe695797579d4d92d1f45d50064e965beb8f0474427d40fc6fc3fc99

    • Size

      354KB

    • MD5

      8be58bd0082837d5d1ce6dbcdc8073ad

    • SHA1

      94a65d5ec4a1a2acfa309f4cc7f29828d30af4fc

    • SHA256

      9711f85fbe695797579d4d92d1f45d50064e965beb8f0474427d40fc6fc3fc99

    • SHA512

      8617c495c710b3a0758483b38e2b1497e60c26f368ac239abc6cebace39ecd454065001031044a283f1ce8b5224c6e60ed60f318461e5944d24773bcb77b09ea

    • SSDEEP

      6144:54VTeo7l77jkCD+1or3VAOMxp5dcQxzJ9wK2cMMQeLF5N:KJeoKHWUxt9RF5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks