General

  • Target

    47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a

  • Size

    410KB

  • Sample

    231023-rwewbsbb63

  • MD5

    66cf19be613af7479ee67166223b539e

  • SHA1

    0065a65bf422ad211d16aae56f6fdb9b8742995b

  • SHA256

    cfd6fda57f152702d53cf3a3f2b0a54e24675461747acf45f15b13d1394a8c81

  • SHA512

    c122f9c47cd1c130e4dd733ee71d075273591186e22d25aa6eb8e2bbdc233bde086371d5e47d6216d82aa036e85f39233531780930ebf8d93c730b35ecf48261

  • SSDEEP

    6144:SW+0X3Vyo8nkwsBnbkhFE/ytcR9ozHaBX9Yv4XSbUlcdxBVUpsrGNubpm9BKpeGA:NNYJs63FtKyaBX9Y4Soc9UZ0bm3GSf

Malware Config

Extracted

Family

redline

Botnet

Installs3000_20231023

C2

62.72.23.19:80

Targets

    • Target

      47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a

    • Size

      1.1MB

    • MD5

      dcc50df94a2741682e1899444e81ebeb

    • SHA1

      7b8b68244aa04e36b9a85e78d306b9dafccbf33b

    • SHA256

      47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a

    • SHA512

      6764c83c26717ec2af28c1dc758404583233bc6eba9483a92c9d94d814b35f4bcb0a09bac146b569a876adf79a299228ef8e1ba49f5c12a1e7eb78696f11def8

    • SSDEEP

      12288:WZLxMjbRoaZei8jhA9iH9x6y0BFKhTZvF9+mKe5OLfaY2X1R7RIsEPYsulocuvMp:aWjFoaZeDhA9iH9r08vSaYoRsPYB3a/Y

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks