General

  • Target

    https://mega.nz/file/RmMlXYpQ#IEoSr_9aKIFhG2qgwdznUmskyYX81Zt7_hWAlIBFRKo

  • Sample

    230610-lbq5zaee57

Malware Config

Extracted

Family

redline

Botnet

cryptx

C2

94.142.138.105:15111

Attributes
  • auth_value

    a45302b7daf4f87798af144567e5d0ff

Targets

    • Target

      https://mega.nz/file/RmMlXYpQ#IEoSr_9aKIFhG2qgwdznUmskyYX81Zt7_hWAlIBFRKo

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks