General

  • Target

    file.exe

  • Size

    2.5MB

  • Sample

    230804-wbpx1sdc74

  • MD5

    9225af6907f744e62582f10d2ff6e55a

  • SHA1

    e980cd01dc2ee38bea8de49eabff1ad84d0cf14f

  • SHA256

    801c2bd3ddf4cc21ea6d95eaf5e9bbba3b9f0ce256e4af670217754dd7473a1e

  • SHA512

    6e0b824f5bfd2a42bc065fe5de5bf33de48c412b8cc5502e448dd5746305927223530ca44870f92f2b386767e4abad7804d31b34926abdb4b7cb18ad7c9e286d

  • SSDEEP

    24576:ezfDdstXT4e+MnrgWlDg8MnmBea3dyY69i1MWY:e6XT4e+GdrLBeq6V

Malware Config

Targets

    • Target

      file.exe

    • Size

      2.5MB

    • MD5

      9225af6907f744e62582f10d2ff6e55a

    • SHA1

      e980cd01dc2ee38bea8de49eabff1ad84d0cf14f

    • SHA256

      801c2bd3ddf4cc21ea6d95eaf5e9bbba3b9f0ce256e4af670217754dd7473a1e

    • SHA512

      6e0b824f5bfd2a42bc065fe5de5bf33de48c412b8cc5502e448dd5746305927223530ca44870f92f2b386767e4abad7804d31b34926abdb4b7cb18ad7c9e286d

    • SSDEEP

      24576:ezfDdstXT4e+MnrgWlDg8MnmBea3dyY69i1MWY:e6XT4e+GdrLBeq6V

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks