Resubmissions

30-03-2023 08:10

230330-j2y76adb8v 10

30-03-2023 06:06

230330-gttxcsbb64 10

General

  • Target

    New Section 1.one

  • Size

    687KB

  • Sample

    230330-j2y76adb8v

  • MD5

    8ae07041e2b2c7201571f3b9541c3925

  • SHA1

    f2c15ca4740fb2a1c11e8cd55181ba97caae3c77

  • SHA256

    462bf8a2e19a3e2dd4e5635aa5089e7bdc291d5c5c4665549f64f67abf0b598a

  • SHA512

    16643ff70f5b74a8516ad93625db110c6f04f29bb2fdc43009f1f77732e9a51b8d814872ff17598c3a014ebccf41aea396650f2a18a7cd69e83435443ba6e92d

  • SSDEEP

    12288:CIjHiImv+fuHiMRLAlR88CQaAY3MjplVTK57xg/96LxY55W:DjH3+PiMRL98CkY3MrVqSs

Malware Config

Extracted

Family

redline

Botnet

kento

C2

172.245.45.213:3235

Attributes
  • auth_value

    25782da22784dd4df09e2caa33275948

Targets

    • Target

      New Section 1.one

    • Size

      687KB

    • MD5

      8ae07041e2b2c7201571f3b9541c3925

    • SHA1

      f2c15ca4740fb2a1c11e8cd55181ba97caae3c77

    • SHA256

      462bf8a2e19a3e2dd4e5635aa5089e7bdc291d5c5c4665549f64f67abf0b598a

    • SHA512

      16643ff70f5b74a8516ad93625db110c6f04f29bb2fdc43009f1f77732e9a51b8d814872ff17598c3a014ebccf41aea396650f2a18a7cd69e83435443ba6e92d

    • SSDEEP

      12288:CIjHiImv+fuHiMRLAlR88CQaAY3MjplVTK57xg/96LxY55W:DjH3+PiMRL98CkY3MrVqSs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks