General

  • Target

    dde59b9565ab86e355176e319ea233455612cb9dcb004aad10f72554f2a924bc

  • Size

    1.0MB

  • Sample

    230911-jm4jbsed2v

  • MD5

    924503da974d3c0da57988cc33b0ff34

  • SHA1

    781cb2ef7e7702be84cc3b94fb70f0959c59201a

  • SHA256

    dde59b9565ab86e355176e319ea233455612cb9dcb004aad10f72554f2a924bc

  • SHA512

    fec0c564adaeca88b7f13596980e295fe32da09fc1d7833b79b13f0737e82f5064f6901b3df4a5f7534e498637e4fe3e4954281f51ac0fb500c0a850d58aba59

  • SSDEEP

    24576:HlG6VugrdGAYF7AVkIk3TDcUprgTQQMjrDh:PugrdGAO7KkzXp0sQADh

Malware Config

Extracted

Family

redline

Botnet

amadey_api

C2

amadapi.tuktuk.ug:11290

Attributes
  • auth_value

    a004bea47cf55a1c8841d46c3fe3e6f5

Targets

    • Target

      dde59b9565ab86e355176e319ea233455612cb9dcb004aad10f72554f2a924bc

    • Size

      1.0MB

    • MD5

      924503da974d3c0da57988cc33b0ff34

    • SHA1

      781cb2ef7e7702be84cc3b94fb70f0959c59201a

    • SHA256

      dde59b9565ab86e355176e319ea233455612cb9dcb004aad10f72554f2a924bc

    • SHA512

      fec0c564adaeca88b7f13596980e295fe32da09fc1d7833b79b13f0737e82f5064f6901b3df4a5f7534e498637e4fe3e4954281f51ac0fb500c0a850d58aba59

    • SSDEEP

      24576:HlG6VugrdGAYF7AVkIk3TDcUprgTQQMjrDh:PugrdGAO7KkzXp0sQADh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks