General

  • Target

    f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb

  • Size

    289KB

  • Sample

    230309-18fstscb9z

  • MD5

    bc34fa73d188d1f45b0a1f69ae3a5383

  • SHA1

    1e931ce12326a7cef1fc5b2ba429400c4752fd6c

  • SHA256

    f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb

  • SHA512

    b0ef89fe1e6bcead998e0d9a1677a56d221cad96a45b7e0e6f5035a5d0e27ccdc15275b725fbc9989a0d79fab3b960811960fe3a891a7e9d906fee16afec840b

  • SSDEEP

    3072:lhKG/JfWnaql/8dHKnynw+DB4sJKyY9smD6qfuItVkC84C2KXTeE2tu2:lhv/9Y9/8dHrw+DB/r1QlfuLCKXTeE2J

Malware Config

Extracted

Family

redline

C2

95.216.251.184:4321

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Targets

    • Target

      f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb

    • Size

      289KB

    • MD5

      bc34fa73d188d1f45b0a1f69ae3a5383

    • SHA1

      1e931ce12326a7cef1fc5b2ba429400c4752fd6c

    • SHA256

      f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb

    • SHA512

      b0ef89fe1e6bcead998e0d9a1677a56d221cad96a45b7e0e6f5035a5d0e27ccdc15275b725fbc9989a0d79fab3b960811960fe3a891a7e9d906fee16afec840b

    • SSDEEP

      3072:lhKG/JfWnaql/8dHKnynw+DB4sJKyY9smD6qfuItVkC84C2KXTeE2tu2:lhv/9Y9/8dHrw+DB/r1QlfuLCKXTeE2J

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks