General

  • Target

    84447b2534a241354998b6b6556f74c99775e160d0381466be29cfe8d804bf18

  • Size

    1.4MB

  • Sample

    231001-19wwfaeb2z

  • MD5

    d21c6a8e2c0966635c477d44cba7c035

  • SHA1

    3b6871ac7095ff7d5322e5a5138d172c0878e784

  • SHA256

    84447b2534a241354998b6b6556f74c99775e160d0381466be29cfe8d804bf18

  • SHA512

    01ad16df4315d2ce72ca587525212d0e8843ef6053b9845cdc761e8ffa453da24a99d0aeaeedfe2061ee66d1be545fb0dc2516c6b7135f76993e6815bc2fe77f

  • SSDEEP

    24576:PryzyicBpqoZTg1qnZtq6PwszmfKj1b9x:PlBpqoZTgYtPNz2Kj9/

Malware Config

Extracted

Family

redline

Botnet

unique285

C2

194.169.175.232:45451

Attributes
  • auth_value

    1ed06994a9a19d3729019cb69c1f61a6

Targets

    • Target

      84447b2534a241354998b6b6556f74c99775e160d0381466be29cfe8d804bf18

    • Size

      1.4MB

    • MD5

      d21c6a8e2c0966635c477d44cba7c035

    • SHA1

      3b6871ac7095ff7d5322e5a5138d172c0878e784

    • SHA256

      84447b2534a241354998b6b6556f74c99775e160d0381466be29cfe8d804bf18

    • SHA512

      01ad16df4315d2ce72ca587525212d0e8843ef6053b9845cdc761e8ffa453da24a99d0aeaeedfe2061ee66d1be545fb0dc2516c6b7135f76993e6815bc2fe77f

    • SSDEEP

      24576:PryzyicBpqoZTg1qnZtq6PwszmfKj1b9x:PlBpqoZTgYtPNz2Kj9/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks