General

  • Target

    a726416e69318522b27e7eb0595bdb6a.exe

  • Size

    385KB

  • Sample

    230122-e79tmafc32

  • MD5

    a726416e69318522b27e7eb0595bdb6a

  • SHA1

    402077e6be869e60d75477cf8a3d4bc880e56b5b

  • SHA256

    bc3e7a7322cfbb7fcfcc076a56d042e7c4f91d1b7284167773a53681fed06e38

  • SHA512

    3f5a5891d4669464931db159fd29fc02ee29b8e1ee86a493b43efc75a8876d0ef89f88c18586c3b916be2e9b440c5ffba9e8b66e4cdb2458e69e884838f87ae9

  • SSDEEP

    6144:XN45ZtXLHb68+KEcwjczdUR4N5pwY96S132S2pxBHkbbvi5t+ef23x/LPII+:K5TP68+NczaW2w6S1GS9bb8Hf23xTQ1

Malware Config

Extracted

Family

redline

Botnet

love

C2

45.15.157.0:22598

Attributes
  • auth_value

    f2b8ce19d1b1584a3972de28dfe5bf40

Targets

    • Target

      a726416e69318522b27e7eb0595bdb6a.exe

    • Size

      385KB

    • MD5

      a726416e69318522b27e7eb0595bdb6a

    • SHA1

      402077e6be869e60d75477cf8a3d4bc880e56b5b

    • SHA256

      bc3e7a7322cfbb7fcfcc076a56d042e7c4f91d1b7284167773a53681fed06e38

    • SHA512

      3f5a5891d4669464931db159fd29fc02ee29b8e1ee86a493b43efc75a8876d0ef89f88c18586c3b916be2e9b440c5ffba9e8b66e4cdb2458e69e884838f87ae9

    • SSDEEP

      6144:XN45ZtXLHb68+KEcwjczdUR4N5pwY96S132S2pxBHkbbvi5t+ef23x/LPII+:K5TP68+NczaW2w6S1GS9bb8Hf23xTQ1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks