General

  • Target

    0b6aca2b212a41ee3d416733bf520d9649b693f03b6b73dd7296bab9bbe7b611

  • Size

    308KB

  • Sample

    230608-vspsxaha94

  • MD5

    b2175485789714e864fc2ab6efcd3213

  • SHA1

    d4e6c4a4a4fa6ad096d3baa4cdde52f1b9b5bfb1

  • SHA256

    0b6aca2b212a41ee3d416733bf520d9649b693f03b6b73dd7296bab9bbe7b611

  • SHA512

    63b2d522d3d0e4d750db084dd1edb5c7c0456252e66028b639a3f0b3a8487a77e11b592cd31aa92f89b309c7c94f3692cd33c54817f2b09c3f572ef5ee1c3992

  • SSDEEP

    6144:dJiekRFHwpMnTDs7UNVS49kCNQSzrs5kLJhHVugiqtciLRc1tIP:dJ4RvD7NQSzrs5kLJhHVugiqtciLRyIP

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Targets

    • Target

      0b6aca2b212a41ee3d416733bf520d9649b693f03b6b73dd7296bab9bbe7b611

    • Size

      308KB

    • MD5

      b2175485789714e864fc2ab6efcd3213

    • SHA1

      d4e6c4a4a4fa6ad096d3baa4cdde52f1b9b5bfb1

    • SHA256

      0b6aca2b212a41ee3d416733bf520d9649b693f03b6b73dd7296bab9bbe7b611

    • SHA512

      63b2d522d3d0e4d750db084dd1edb5c7c0456252e66028b639a3f0b3a8487a77e11b592cd31aa92f89b309c7c94f3692cd33c54817f2b09c3f572ef5ee1c3992

    • SSDEEP

      6144:dJiekRFHwpMnTDs7UNVS49kCNQSzrs5kLJhHVugiqtciLRc1tIP:dJ4RvD7NQSzrs5kLJhHVugiqtciLRyIP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks