General

  • Target

    NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe

  • Size

    11.7MB

  • Sample

    231107-bq4z9shd4y

  • MD5

    69a568a135864396940144fff6f652ca

  • SHA1

    a9114775249469077b33353e646fef5aa160ab11

  • SHA256

    23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25

  • SHA512

    a79ffd039616fc518dbee8662450879e8864e008d37c355e4040580f580a5d0bb5f6e575e08f7b13232a34c463c91106d5cebbde6da59a080c9ae569f4728b46

  • SSDEEP

    196608:bzzKbBgpSjhv4u0UawvsX+sfrzSMC1138G41ILPUrd71gtX1cICMhg0YkH:PubOpGhguVs+krYKIj8x1WrhR

Malware Config

Extracted

Family

redline

C2

5.75.177.255:23682

Targets

    • Target

      NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe

    • Size

      11.7MB

    • MD5

      69a568a135864396940144fff6f652ca

    • SHA1

      a9114775249469077b33353e646fef5aa160ab11

    • SHA256

      23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25

    • SHA512

      a79ffd039616fc518dbee8662450879e8864e008d37c355e4040580f580a5d0bb5f6e575e08f7b13232a34c463c91106d5cebbde6da59a080c9ae569f4728b46

    • SSDEEP

      196608:bzzKbBgpSjhv4u0UawvsX+sfrzSMC1138G41ILPUrd71gtX1cICMhg0YkH:PubOpGhguVs+krYKIj8x1WrhR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks