General

  • Target

    8a3fbb366200fdcc66a6686f5b1d2ad8f15ea9b06b19304e3629cbea56d21b05

  • Size

    1.0MB

  • Sample

    230911-bhxafsch88

  • MD5

    b91caa620f610487d41240e6d466f9c3

  • SHA1

    8133bd4cae56faeb3dfa307c9742a7bf949d797a

  • SHA256

    8a3fbb366200fdcc66a6686f5b1d2ad8f15ea9b06b19304e3629cbea56d21b05

  • SHA512

    fd148036af5efd9207f0f468d056b04464e0d8798590ea36d93e875fe9f61f9d014755ed336679c5da5e919c7186c707e1c0c359925d6c2e06cf78b797628fe5

  • SSDEEP

    24576:wlG6VugrdGAY1r41kIk3TDkkBL8UjGjCubAvHo762rDh:yugrdGAerikzPBvjGjCubAvHo76WDh

Malware Config

Extracted

Family

redline

Botnet

amadey_api

C2

amadapi.tuktuk.ug:11290

Attributes
  • auth_value

    a004bea47cf55a1c8841d46c3fe3e6f5

Targets

    • Target

      8a3fbb366200fdcc66a6686f5b1d2ad8f15ea9b06b19304e3629cbea56d21b05

    • Size

      1.0MB

    • MD5

      b91caa620f610487d41240e6d466f9c3

    • SHA1

      8133bd4cae56faeb3dfa307c9742a7bf949d797a

    • SHA256

      8a3fbb366200fdcc66a6686f5b1d2ad8f15ea9b06b19304e3629cbea56d21b05

    • SHA512

      fd148036af5efd9207f0f468d056b04464e0d8798590ea36d93e875fe9f61f9d014755ed336679c5da5e919c7186c707e1c0c359925d6c2e06cf78b797628fe5

    • SSDEEP

      24576:wlG6VugrdGAY1r41kIk3TDkkBL8UjGjCubAvHo762rDh:yugrdGAerikzPBvjGjCubAvHo76WDh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks