General

  • Target

    21c2136f0b81e73eff65cad975c0390083f1de5081b7d34a056ddfec9348f0c8

  • Size

    1.0MB

  • Sample

    230911-ph9sfafg7v

  • MD5

    6ed82d0e6c96536c507c75887ac8f7be

  • SHA1

    2e7776958a23d12edd24630b9e71a0903c821942

  • SHA256

    21c2136f0b81e73eff65cad975c0390083f1de5081b7d34a056ddfec9348f0c8

  • SHA512

    87393a6f416d914c3f0b8276f199996fa5c0d6888a36956f53014847745806047d6ba50935b8c5b145ea921e9225f40445418d911d8cf024704bf8031d8fcbce

  • SSDEEP

    24576:hlG6VugrdGAYF7AVkIk3TDcUproosB7oQUVrDh:xugrdGAO7KkzXpdsINDh

Malware Config

Extracted

Family

redline

Botnet

amadey_api

C2

amadapi.tuktuk.ug:11290

Attributes
  • auth_value

    a004bea47cf55a1c8841d46c3fe3e6f5

Targets

    • Target

      21c2136f0b81e73eff65cad975c0390083f1de5081b7d34a056ddfec9348f0c8

    • Size

      1.0MB

    • MD5

      6ed82d0e6c96536c507c75887ac8f7be

    • SHA1

      2e7776958a23d12edd24630b9e71a0903c821942

    • SHA256

      21c2136f0b81e73eff65cad975c0390083f1de5081b7d34a056ddfec9348f0c8

    • SHA512

      87393a6f416d914c3f0b8276f199996fa5c0d6888a36956f53014847745806047d6ba50935b8c5b145ea921e9225f40445418d911d8cf024704bf8031d8fcbce

    • SSDEEP

      24576:hlG6VugrdGAYF7AVkIk3TDcUproosB7oQUVrDh:xugrdGAO7KkzXpdsINDh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks