General

  • Target

    d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd

  • Size

    1.1MB

  • Sample

    230414-17m6hsdf6s

  • MD5

    e94aeb4f076d831aa78fe9c14ab7af02

  • SHA1

    0acd0a16f8208b243ae5b6b02b116eb8094d5752

  • SHA256

    d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd

  • SHA512

    aae40bf3c0082fe096742cbc6d5ded475c6240357d3ab79d97793168c8a30dc5f6b7f21c8fb09a64d8d9fc2a409334b5d72fd74b53c60ba3471fb3a9f70d9d6c

  • SSDEEP

    6144:X2ZTmVLrIcqBUAOJcULhQl/JkQBWes8JFTxa4HpzJJ/:XmmVvVkULS/2Q08JFHpv/

Malware Config

Extracted

Family

redline

C2

135.181.241.192:4327

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Targets

    • Target

      d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd

    • Size

      1.1MB

    • MD5

      e94aeb4f076d831aa78fe9c14ab7af02

    • SHA1

      0acd0a16f8208b243ae5b6b02b116eb8094d5752

    • SHA256

      d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd

    • SHA512

      aae40bf3c0082fe096742cbc6d5ded475c6240357d3ab79d97793168c8a30dc5f6b7f21c8fb09a64d8d9fc2a409334b5d72fd74b53c60ba3471fb3a9f70d9d6c

    • SSDEEP

      6144:X2ZTmVLrIcqBUAOJcULhQl/JkQBWes8JFTxa4HpzJJ/:XmmVvVkULS/2Q08JFHpv/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks