General

  • Target

    2da19a4e1c0fe008419b97a8fea15d5879297555

  • Size

    241KB

  • Sample

    230113-a3dheafh3s

  • MD5

    7637110e274a39065d6a09406ef525c3

  • SHA1

    2da19a4e1c0fe008419b97a8fea15d5879297555

  • SHA256

    1c2f186610bc1f39f9800f9caa2dd42bdaacd88ae885fff67d7d3b9f8961dd0f

  • SHA512

    f4eb2b06956a839b4e4e353a19af1b46e69ac7215fd9d12660ecc8e25a98b0e67833b7bdf39fc25d9841bb3b8813e3dafd65bbaea0ae06af3164c925f091e924

  • SSDEEP

    6144:jn85mUDE07RXADtNBAl1C7Wt9hHAO6XNgc+tc:goUDE07RXADExGx+2

Malware Config

Extracted

Family

redline

Botnet

1

C2

107.182.129.73:21733

Attributes
  • auth_value

    3a5bb0917495b4312d052a0b8977d2bb

Targets

    • Target

      2da19a4e1c0fe008419b97a8fea15d5879297555

    • Size

      241KB

    • MD5

      7637110e274a39065d6a09406ef525c3

    • SHA1

      2da19a4e1c0fe008419b97a8fea15d5879297555

    • SHA256

      1c2f186610bc1f39f9800f9caa2dd42bdaacd88ae885fff67d7d3b9f8961dd0f

    • SHA512

      f4eb2b06956a839b4e4e353a19af1b46e69ac7215fd9d12660ecc8e25a98b0e67833b7bdf39fc25d9841bb3b8813e3dafd65bbaea0ae06af3164c925f091e924

    • SSDEEP

      6144:jn85mUDE07RXADtNBAl1C7Wt9hHAO6XNgc+tc:goUDE07RXADExGx+2

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Stops running service(s)

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks