General

  • Target

    6e183fbb7006572b28fe4283d9cc9f240913cc376912885e6927d7ce3687eb15exe_JC.exe

  • Size

    2.4MB

  • Sample

    230805-nlvx1sde9s

  • MD5

    a5da0019144388384d19de94e6b74770

  • SHA1

    08cee8bd4e73f7534b0d01d4b20a2db3aee5c5b1

  • SHA256

    6e183fbb7006572b28fe4283d9cc9f240913cc376912885e6927d7ce3687eb15

  • SHA512

    5eeee85d9bea8ca6ebe5e233b6dc05033e6499472e67d997c5d11bd564d524a786814ac100994f6b7893868a1035e4bee17099966180fea46fade150a28082da

  • SSDEEP

    12288:f8sx52AiexTrSOSqWdf1zw2HTKNbh7k1g6YmfQyV0u4SO1k8xVUmQwZeQENBwln:r52A3xTrSOlk1yk1g6YmBe1BUxNKF

Malware Config

Extracted

Family

redline

Botnet

3

C2

5.42.66.8:38264

Attributes
  • auth_value

    d5444f65bb3086d22f768e536247ba5d

Targets

    • Target

      6e183fbb7006572b28fe4283d9cc9f240913cc376912885e6927d7ce3687eb15exe_JC.exe

    • Size

      2.4MB

    • MD5

      a5da0019144388384d19de94e6b74770

    • SHA1

      08cee8bd4e73f7534b0d01d4b20a2db3aee5c5b1

    • SHA256

      6e183fbb7006572b28fe4283d9cc9f240913cc376912885e6927d7ce3687eb15

    • SHA512

      5eeee85d9bea8ca6ebe5e233b6dc05033e6499472e67d997c5d11bd564d524a786814ac100994f6b7893868a1035e4bee17099966180fea46fade150a28082da

    • SSDEEP

      12288:f8sx52AiexTrSOSqWdf1zw2HTKNbh7k1g6YmfQyV0u4SO1k8xVUmQwZeQENBwln:r52A3xTrSOlk1yk1g6YmBe1BUxNKF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks