General

  • Target

    a137c8887a7fbcc4eb96fc511c4ac36f.exe

  • Size

    896KB

  • Sample

    230104-j81dsseh47

  • MD5

    a137c8887a7fbcc4eb96fc511c4ac36f

  • SHA1

    85d7ff6e4867a8f0df1589853b51ca303dbcc2f4

  • SHA256

    bbbb1f90ed2f62c10cd7c3d7b0c464b26462c2457ad9f80ccbd2a2d019e6c2df

  • SHA512

    4a716ea7aef11633c6eadc5db76cf53c6def53e0d91b7d406a63e6f8a3c04f76a9c5271c7ac52a4e58e8eb838e36330daea0ec187e871791aa69328a6c103f4c

  • SSDEEP

    12288:EN0rf7bnF+RK9FmkoDCOvPTHWUImjhIKHALY/mMQ/sCEbN:1PwCOvaUImj//xmMB

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

blackrdp.mentality.cloud:45169

Targets

    • Target

      a137c8887a7fbcc4eb96fc511c4ac36f.exe

    • Size

      896KB

    • MD5

      a137c8887a7fbcc4eb96fc511c4ac36f

    • SHA1

      85d7ff6e4867a8f0df1589853b51ca303dbcc2f4

    • SHA256

      bbbb1f90ed2f62c10cd7c3d7b0c464b26462c2457ad9f80ccbd2a2d019e6c2df

    • SHA512

      4a716ea7aef11633c6eadc5db76cf53c6def53e0d91b7d406a63e6f8a3c04f76a9c5271c7ac52a4e58e8eb838e36330daea0ec187e871791aa69328a6c103f4c

    • SSDEEP

      12288:EN0rf7bnF+RK9FmkoDCOvPTHWUImjhIKHALY/mMQ/sCEbN:1PwCOvaUImj//xmMB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks