General

  • Target

    82eab1b2cab9f16d77c242e4ff1eb983d7e0a64b78b5dc69d87af2a4016f4f39_JC.exe

  • Size

    1.4MB

  • Sample

    231002-mkp5psha4v

  • MD5

    965fcf373f3e95995f8ae35df758eca1

  • SHA1

    a62d2494f6ba8a02a80a02017e7c347f76b18fa6

  • SHA256

    82eab1b2cab9f16d77c242e4ff1eb983d7e0a64b78b5dc69d87af2a4016f4f39

  • SHA512

    55e9fefbe2a1ed92034573f3c4bb03fe29b0d345ebe834f2f9192d5ddd2237f1bb8e4fb5f9516852e7e0efa42a3122a11d2f0db7c9633b1566901cdd7862ff52

  • SSDEEP

    12288:qbYbF8jzyivUBpqoZTaSKlzLR7EnRfaYRZAjTkYWtq67DQC4w4C9u6gohgMmOFwx:q+yzyicBpqoZTgVKfptq6PQMUAgb9/

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Attributes
  • auth_value

    295b226f1b63bcd55148625381b27b19

Targets

    • Target

      82eab1b2cab9f16d77c242e4ff1eb983d7e0a64b78b5dc69d87af2a4016f4f39_JC.exe

    • Size

      1.4MB

    • MD5

      965fcf373f3e95995f8ae35df758eca1

    • SHA1

      a62d2494f6ba8a02a80a02017e7c347f76b18fa6

    • SHA256

      82eab1b2cab9f16d77c242e4ff1eb983d7e0a64b78b5dc69d87af2a4016f4f39

    • SHA512

      55e9fefbe2a1ed92034573f3c4bb03fe29b0d345ebe834f2f9192d5ddd2237f1bb8e4fb5f9516852e7e0efa42a3122a11d2f0db7c9633b1566901cdd7862ff52

    • SSDEEP

      12288:qbYbF8jzyivUBpqoZTaSKlzLR7EnRfaYRZAjTkYWtq67DQC4w4C9u6gohgMmOFwx:q+yzyicBpqoZTgVKfptq6PQMUAgb9/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks