General

  • Target

    D2file.file

  • Size

    1MB

  • Sample

    230627-rk9xbsfc71

  • MD5

    9e91a072dd6ddc211e5b85f5240bfc30

  • SHA1

    4290287ca79f08e0191dfd167eefef6f7a6b646a

  • SHA256

    ef14a15e5e045d37174de6607c62a18bf1eddf9654757b57cf8f5b29ce625c8e

  • SHA512

    55e630856a1d8fb0db7022a09a2022e6116ce4b2a0cfe56b0a0d2751a1fe45a49e8113591f266b7240ef28dc652bc4d6ca57262f6a65890c168edb63255866ee

  • SSDEEP

    24576:2TbBv5rUyXVXcJApapb36Ea6zjckIMyPADtuCfbf2EDB9Om/4ON15tJ3NHKPI3zF:IBJMKgpbiojIbKuCjfx9JbND3r3zNkE

Malware Config

Extracted

Family

redline

Botnet

1

C2

95.216.249.153:15251

Attributes
  • auth_value

    daf551232a4a9b23743b2f4792a8728f

Targets

    • Target

      D2file.file

    • Size

      1MB

    • MD5

      9e91a072dd6ddc211e5b85f5240bfc30

    • SHA1

      4290287ca79f08e0191dfd167eefef6f7a6b646a

    • SHA256

      ef14a15e5e045d37174de6607c62a18bf1eddf9654757b57cf8f5b29ce625c8e

    • SHA512

      55e630856a1d8fb0db7022a09a2022e6116ce4b2a0cfe56b0a0d2751a1fe45a49e8113591f266b7240ef28dc652bc4d6ca57262f6a65890c168edb63255866ee

    • SSDEEP

      24576:2TbBv5rUyXVXcJApapb36Ea6zjckIMyPADtuCfbf2EDB9Om/4ON15tJ3NHKPI3zF:IBJMKgpbiojIbKuCjfx9JbND3r3zNkE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks