General

  • Target

    tmp

  • Size

    1.3MB

  • Sample

    230805-kar57sah99

  • MD5

    2ddbd7e7fdf9bf2edfa375ad6fe2f6f5

  • SHA1

    7f8fb773d3c17d05dcf46802b33f024b53c48c96

  • SHA256

    9354c11be1fbde7607e1139a9fecff5269d7f8dba8f6fbe35c950074bc0cdefe

  • SHA512

    7c4224441c5b497635294866c999d9d601248ff16272b2cf4f3f2b91c6e08ab51d2d273b91cac24eafcea4018daa339d0ff62b33b1540fbf9aaa4e7b9f3e1c29

  • SSDEEP

    12288:dTVIe2S3HqYM7d6197u0cyUWf5GIkB1DlGul3VbCb2mGmPPNru7+glPm5PozTjuM:/3HqX7d6197u1yVUl3VuamXPNc+ipp

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.9.85:16482

Attributes
  • auth_value

    24848220823af15a5e52db502394fad3

Targets

    • Target

      tmp

    • Size

      1.3MB

    • MD5

      2ddbd7e7fdf9bf2edfa375ad6fe2f6f5

    • SHA1

      7f8fb773d3c17d05dcf46802b33f024b53c48c96

    • SHA256

      9354c11be1fbde7607e1139a9fecff5269d7f8dba8f6fbe35c950074bc0cdefe

    • SHA512

      7c4224441c5b497635294866c999d9d601248ff16272b2cf4f3f2b91c6e08ab51d2d273b91cac24eafcea4018daa339d0ff62b33b1540fbf9aaa4e7b9f3e1c29

    • SSDEEP

      12288:dTVIe2S3HqYM7d6197u0cyUWf5GIkB1DlGul3VbCb2mGmPPNru7+glPm5PozTjuM:/3HqX7d6197u1yVUl3VuamXPNc+ipp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks