General

  • Target

    11.exe

  • Size

    1.2MB

  • Sample

    230420-afgasaeb62

  • MD5

    14f74bf3111e2f4f5e0627ae73aca0be

  • SHA1

    af5a5c13cc3900136b408cd3f5caec957f3ecf27

  • SHA256

    f401cd90e781b747d207796dd7327db534fbb3e362a9df0fb21e78d8104871f1

  • SHA512

    1b6524033ade35159d2c6de2f8da5542c31c164ebebd1180b7189458034c45d0474c6d8eb393a64a294345addb73931cdbdfa635435242da124bbd2cc755f874

  • SSDEEP

    6144:DG1dDszSc/wXmkAODwyWfKp6LWVMZb1YFv9Edm:q1dDsqN6fKp6LW2ZaUm

Malware Config

Extracted

Family

redline

Botnet

kyotranbot

C2

45.77.166.103:37904

Attributes
  • auth_value

    039a36b7ff8c4be7a5e5f93361625ea2

Targets

    • Target

      11.exe

    • Size

      1.2MB

    • MD5

      14f74bf3111e2f4f5e0627ae73aca0be

    • SHA1

      af5a5c13cc3900136b408cd3f5caec957f3ecf27

    • SHA256

      f401cd90e781b747d207796dd7327db534fbb3e362a9df0fb21e78d8104871f1

    • SHA512

      1b6524033ade35159d2c6de2f8da5542c31c164ebebd1180b7189458034c45d0474c6d8eb393a64a294345addb73931cdbdfa635435242da124bbd2cc755f874

    • SSDEEP

      6144:DG1dDszSc/wXmkAODwyWfKp6LWVMZb1YFv9Edm:q1dDsqN6fKp6LW2ZaUm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks