General

  • Target

    dc08c886e74bc9591fcb680110b3c0ca6ef53acabe927deb5e6d2b4dc37a8a81

  • Size

    702KB

  • Sample

    230922-ktbybseh71

  • MD5

    a73a4e4554aa5d055968505cecd935ad

  • SHA1

    1d01c78923773c452054bb22a08cfe0158d0c972

  • SHA256

    dc08c886e74bc9591fcb680110b3c0ca6ef53acabe927deb5e6d2b4dc37a8a81

  • SHA512

    af39c263afaee959c630ea1f8aedcd06ff3a5a0c3a6a35cc28142e1834f7100527e22c61e126c31696dba7497fdfdec75ba352237a6ed2257cc03386fc2124ba

  • SSDEEP

    6144:X42shISlTyAQgBhEPfgjad4tfd2Vl4uVQPSzA8qQzs9JGdvUEgfC:I2shISEAQgsPfg64uVQPSc8qQzsW5U5C

Malware Config

Extracted

Family

redline

Botnet

smokiez

C2

194.169.175.232:45450

Attributes
  • auth_value

    7b7d8a036038ab89b98f422d559b4f8f

Targets

    • Target

      dc08c886e74bc9591fcb680110b3c0ca6ef53acabe927deb5e6d2b4dc37a8a81

    • Size

      702KB

    • MD5

      a73a4e4554aa5d055968505cecd935ad

    • SHA1

      1d01c78923773c452054bb22a08cfe0158d0c972

    • SHA256

      dc08c886e74bc9591fcb680110b3c0ca6ef53acabe927deb5e6d2b4dc37a8a81

    • SHA512

      af39c263afaee959c630ea1f8aedcd06ff3a5a0c3a6a35cc28142e1834f7100527e22c61e126c31696dba7497fdfdec75ba352237a6ed2257cc03386fc2124ba

    • SSDEEP

      6144:X42shISlTyAQgBhEPfgjad4tfd2Vl4uVQPSzA8qQzs9JGdvUEgfC:I2shISEAQgsPfg64uVQPSc8qQzsW5U5C

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks