General

  • Target

    file

  • Size

    1.1MB

  • Sample

    230919-vl2twsag3x

  • MD5

    05aea4b0f343f156b1ccf2903e78c64c

  • SHA1

    e7e3efe9ea840970736db7c60b43dea1cd31e0d0

  • SHA256

    700985f7c1ac041e2ba3762046f248e88a1d6d96ee043ff45fe83fdc8b5f01bb

  • SHA512

    b5773cc9e036f861c629634e034e3a9eec270d2c2dba98bc8ccf98863dceb51b95b2b331ad65e3f8be845871578343fd8756606e46d52d7e028d6dac26721653

  • SSDEEP

    12288:mwsj+N2dA1o49i4ytPZR5QZVfn5TjzorNHK4kIubL0igcH0W4uPlweAdLCAM:psj02dA1h9i4ytQVl3hHzlwYAM

Malware Config

Extracted

Family

redline

Botnet

smokiez

C2

194.169.175.232:45450

Attributes
  • auth_value

    7b7d8a036038ab89b98f422d559b4f8f

Targets

    • Target

      file

    • Size

      1.1MB

    • MD5

      05aea4b0f343f156b1ccf2903e78c64c

    • SHA1

      e7e3efe9ea840970736db7c60b43dea1cd31e0d0

    • SHA256

      700985f7c1ac041e2ba3762046f248e88a1d6d96ee043ff45fe83fdc8b5f01bb

    • SHA512

      b5773cc9e036f861c629634e034e3a9eec270d2c2dba98bc8ccf98863dceb51b95b2b331ad65e3f8be845871578343fd8756606e46d52d7e028d6dac26721653

    • SSDEEP

      12288:mwsj+N2dA1o49i4ytPZR5QZVfn5TjzorNHK4kIubL0igcH0W4uPlweAdLCAM:psj02dA1h9i4ytQVl3hHzlwYAM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks