General

  • Target

    dfd744fe43cc4967e40ea36f107e378a730f332389cb0f2a92b7083ccce34a1f

  • Size

    275KB

  • Sample

    230311-ly5lwahb58

  • MD5

    e8bffb8a3f27f9d27d7578aea96a3c6e

  • SHA1

    d9155d423b763c6750d0895fc318a4e34282e6bb

  • SHA256

    dfd744fe43cc4967e40ea36f107e378a730f332389cb0f2a92b7083ccce34a1f

  • SHA512

    e07292cd81b8193dd69d8d6784929e7039868e354fdad3bae15961c0619b5ef9f48dd533511245892f9ad18bddb51d8269ffdcbae18790f45882b38b067784c1

  • SSDEEP

    6144:G3uL/A/Uz2xiOxa7JDsDX2fhW3v65SZP2EmgkIB:vYMzAiy+sDa2v6mIa

Malware Config

Extracted

Family

redline

C2

95.216.251.184:4321

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Targets

    • Target

      dfd744fe43cc4967e40ea36f107e378a730f332389cb0f2a92b7083ccce34a1f

    • Size

      275KB

    • MD5

      e8bffb8a3f27f9d27d7578aea96a3c6e

    • SHA1

      d9155d423b763c6750d0895fc318a4e34282e6bb

    • SHA256

      dfd744fe43cc4967e40ea36f107e378a730f332389cb0f2a92b7083ccce34a1f

    • SHA512

      e07292cd81b8193dd69d8d6784929e7039868e354fdad3bae15961c0619b5ef9f48dd533511245892f9ad18bddb51d8269ffdcbae18790f45882b38b067784c1

    • SSDEEP

      6144:G3uL/A/Uz2xiOxa7JDsDX2fhW3v65SZP2EmgkIB:vYMzAiy+sDa2v6mIa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks