General

  • Target

    55a16cc67fc52cdf0690387e083955048106d48a

  • Size

    464KB

  • Sample

    230117-x7jasaeb87

  • MD5

    990c8e3fc56a2734631b51fc61a6779a

  • SHA1

    55a16cc67fc52cdf0690387e083955048106d48a

  • SHA256

    d80ce10659442d8e5b9c28e53bf254711881cf9502f52aeb8abf4a15c9e6e36e

  • SHA512

    f5332bcae3242d86a58adf01069c425f5b22bdda9045200fb5b3d9ab3e983d94af8462a04e148b7164e8d6122ec2d198d18081850e00175bb257c0ddb3defdc5

  • SSDEEP

    12288:zDDF2BjT6XYNn5Bx4ecMEkRP4MwEcGnq48yk:zDDF2VT6XYNjA5kRlfqvyk

Malware Config

Extracted

Family

redline

Botnet

1

C2

107.182.129.73:21733

Attributes
  • auth_value

    3a5bb0917495b4312d052a0b8977d2bb

Targets

    • Target

      55a16cc67fc52cdf0690387e083955048106d48a

    • Size

      464KB

    • MD5

      990c8e3fc56a2734631b51fc61a6779a

    • SHA1

      55a16cc67fc52cdf0690387e083955048106d48a

    • SHA256

      d80ce10659442d8e5b9c28e53bf254711881cf9502f52aeb8abf4a15c9e6e36e

    • SHA512

      f5332bcae3242d86a58adf01069c425f5b22bdda9045200fb5b3d9ab3e983d94af8462a04e148b7164e8d6122ec2d198d18081850e00175bb257c0ddb3defdc5

    • SSDEEP

      12288:zDDF2BjT6XYNn5Bx4ecMEkRP4MwEcGnq48yk:zDDF2VT6XYNjA5kRlfqvyk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks