General

  • Target

    0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49

  • Size

    1.5MB

  • Sample

    230802-ecaq2sce72

  • MD5

    0f09cef79b5954fe8741e04f850608ef

  • SHA1

    3e3ede45feda3aa5c61068d98afc99085aedc70d

  • SHA256

    0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49

  • SHA512

    54a689c5ee38a00af2178294b5ff4fd9f03bb26c895c240056a3e6a46510f1f691c547f93fa1a422568bafa76aa1a1feb13fe41e2926c8555413bc161c3e15ea

  • SSDEEP

    24576:2JKhiQ1mEAofpfawMUGWQpVRQPlxJrrP:wQcEAofpf4/p

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.9.85:16482

Attributes
  • auth_value

    24848220823af15a5e52db502394fad3

Targets

    • Target

      0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49

    • Size

      1.5MB

    • MD5

      0f09cef79b5954fe8741e04f850608ef

    • SHA1

      3e3ede45feda3aa5c61068d98afc99085aedc70d

    • SHA256

      0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49

    • SHA512

      54a689c5ee38a00af2178294b5ff4fd9f03bb26c895c240056a3e6a46510f1f691c547f93fa1a422568bafa76aa1a1feb13fe41e2926c8555413bc161c3e15ea

    • SSDEEP

      24576:2JKhiQ1mEAofpfawMUGWQpVRQPlxJrrP:wQcEAofpf4/p

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks