General

  • Target

    tmp

  • Size

    3.7MB

  • Sample

    230122-2yzcvsaa97

  • MD5

    f93efd436289bde91568c958b19abb69

  • SHA1

    9e899b3f05de951a1a35dd130955e52610350932

  • SHA256

    b3424e7615f9ad35d6e1a60a813db6d5e3d85c15d05bdc945d3c59d42465dfe2

  • SHA512

    e250435607e53b1de1d8da50e2cbb3488216ec60d216bd7e416f7bc2bb29d2a103740d552358e7419c0250917455155084af383c21e9142a90a5b349fe7bb80c

  • SSDEEP

    49152:tew4a/eysA/Qk4NZrwS7Ax4tMAWO+acfRdRCuUDr20OglreoEhPLsZGvm7vp/qxD:tZVIJrPACHr5cfRdRC9DrTEhi/Nqnola

Malware Config

Extracted

Family

redline

Botnet

st1

C2

librchichelpai.shop:81

rniwondunuifac.shop:81

Attributes
  • auth_value

    a7232a45d6034ee2454fc434093d8f12

Targets

    • Target

      tmp

    • Size

      3.7MB

    • MD5

      f93efd436289bde91568c958b19abb69

    • SHA1

      9e899b3f05de951a1a35dd130955e52610350932

    • SHA256

      b3424e7615f9ad35d6e1a60a813db6d5e3d85c15d05bdc945d3c59d42465dfe2

    • SHA512

      e250435607e53b1de1d8da50e2cbb3488216ec60d216bd7e416f7bc2bb29d2a103740d552358e7419c0250917455155084af383c21e9142a90a5b349fe7bb80c

    • SSDEEP

      49152:tew4a/eysA/Qk4NZrwS7Ax4tMAWO+acfRdRCuUDr20OglreoEhPLsZGvm7vp/qxD:tZVIJrPACHr5cfRdRC9DrTEhi/Nqnola

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks