General

  • Target

    af14d67f6a621da96f78428841f1add2e94a3ed89fa46bde26452722c814998e

  • Size

    493KB

  • Sample

    231107-fhfpxsbf9w

  • MD5

    b9abe8ca34eb1d6b8119c4dd5db5a5ee

  • SHA1

    ed0bb73cc97efef86b367fd713f2a68b584f543a

  • SHA256

    af14d67f6a621da96f78428841f1add2e94a3ed89fa46bde26452722c814998e

  • SHA512

    66710c43407db5ca2660cfd0325d0b501103a13c248fd1c39cfb63dd1c24fc43ab85529490080b0b92f4ac2174f31ded3fe5317f03279bbb9c9d85b8800fcc7b

  • SSDEEP

    6144:tvb+OdKPZipInz9CRpGAafwfB6GIUlixbfqsgQPaCtsAiDrYHJ7IoVI9b8trXEw1:tPRInz9CAfGBY9XtE8p7IRnek1TA

Malware Config

Targets

    • Target

      af14d67f6a621da96f78428841f1add2e94a3ed89fa46bde26452722c814998e

    • Size

      493KB

    • MD5

      b9abe8ca34eb1d6b8119c4dd5db5a5ee

    • SHA1

      ed0bb73cc97efef86b367fd713f2a68b584f543a

    • SHA256

      af14d67f6a621da96f78428841f1add2e94a3ed89fa46bde26452722c814998e

    • SHA512

      66710c43407db5ca2660cfd0325d0b501103a13c248fd1c39cfb63dd1c24fc43ab85529490080b0b92f4ac2174f31ded3fe5317f03279bbb9c9d85b8800fcc7b

    • SSDEEP

      6144:tvb+OdKPZipInz9CRpGAafwfB6GIUlixbfqsgQPaCtsAiDrYHJ7IoVI9b8trXEw1:tPRInz9CAfGBY9XtE8p7IRnek1TA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks