General

  • Target

    tmp

  • Size

    6.4MB

  • Sample

    230104-p23s8sff32

  • MD5

    bfe6f8581cc2b03a87ff176b63e03cf0

  • SHA1

    eb9e15d544af9ec823c5603c5ba7c1692f7e6194

  • SHA256

    32a0b2435282952f78156d2ed8a459fbd2ae7b376a6b80430934d29cab3d33d8

  • SHA512

    80204836e6ae810ba002c0c6a89c0d672435ab6a31002e9283e492053d43c4c06259eb2045c7cbd723119cd2a45857e0dbc179f35973f62da3c417c4419c0e07

  • SSDEEP

    98304:5dn+cBiWwA2A5V5lqDS/XHt1o0tyGK5jCm+pZl+jRwOySBNmP9sDU9p4:50cILAlfvorGK5j7+pZIDt/ml2Us

Malware Config

Extracted

Family

redline

Botnet

Mastif_22

C2

82.115.223.23:81

Attributes
  • auth_value

    33012a00e3806d4d63de65ff04b9746e

Targets

    • Target

      tmp

    • Size

      6.4MB

    • MD5

      bfe6f8581cc2b03a87ff176b63e03cf0

    • SHA1

      eb9e15d544af9ec823c5603c5ba7c1692f7e6194

    • SHA256

      32a0b2435282952f78156d2ed8a459fbd2ae7b376a6b80430934d29cab3d33d8

    • SHA512

      80204836e6ae810ba002c0c6a89c0d672435ab6a31002e9283e492053d43c4c06259eb2045c7cbd723119cd2a45857e0dbc179f35973f62da3c417c4419c0e07

    • SSDEEP

      98304:5dn+cBiWwA2A5V5lqDS/XHt1o0tyGK5jCm+pZl+jRwOySBNmP9sDU9p4:50cILAlfvorGK5j7+pZIDt/ml2Us

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Blocklisted process makes network request

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks