General

  • Target

    4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c

  • Size

    258KB

  • Sample

    230321-17nr2sdd65

  • MD5

    3e9823524640a692dedcf6a876f7f26a

  • SHA1

    823de6267a9a514be190b270694d6d8eadbf806c

  • SHA256

    4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c

  • SHA512

    e00f764929feb2485dc51d899b341e318bec854bfccc3b588865458a951dc9e3131a0a2b132a5f51bb474537887c9d7d4c9edb6e140fb7a9aaa437ace88fa0a8

  • SSDEEP

    3072:uaHM3QnAMZy10biCL5qM1+Sqwi+KlWJ2NtbH52bxa0tpbVR/CGJnJsT7R6HqZNRa:IAnW0bJqM1+STN2WJEHUdHprFiG7

Malware Config

Extracted

Family

redline

C2

135.181.173.163:4323

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Targets

    • Target

      4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c

    • Size

      258KB

    • MD5

      3e9823524640a692dedcf6a876f7f26a

    • SHA1

      823de6267a9a514be190b270694d6d8eadbf806c

    • SHA256

      4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c

    • SHA512

      e00f764929feb2485dc51d899b341e318bec854bfccc3b588865458a951dc9e3131a0a2b132a5f51bb474537887c9d7d4c9edb6e140fb7a9aaa437ace88fa0a8

    • SSDEEP

      3072:uaHM3QnAMZy10biCL5qM1+Sqwi+KlWJ2NtbH52bxa0tpbVR/CGJnJsT7R6HqZNRa:IAnW0bJqM1+STN2WJEHUdHprFiG7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks