General

  • Target

    11B0557B857DE763E2A1A67B5CF33A7D.exe

  • Size

    469KB

  • Sample

    240125-1d548sfgf9

  • MD5

    11b0557b857de763e2a1a67b5cf33a7d

  • SHA1

    6d033484de053b5d1788568efd364ef8c92d0985

  • SHA256

    ca0eb0fc3b97aca8601de95ca56fd06f565a63f7fabc508bf7f9deac8d58ef18

  • SHA512

    035cfd23ead127bace8c7b89b9e99f7dec0a1916015f7e63e7f6d48b2b951ca78c25673b21af735bafc6f78f483f8661666a67135c54b075d0ec91f55322b37c

  • SSDEEP

    6144:Tepyy7cR+ZjD7fAOlRjx3ruLR4Cf75uL8Mzci:Tepr7KEfbpx3ru14Cf78ci

Malware Config

Extracted

Family

redline

Botnet

2131228623

C2

https://pastebin.com/raw/NgsUAPya

Targets

    • Target

      11B0557B857DE763E2A1A67B5CF33A7D.exe

    • Size

      469KB

    • MD5

      11b0557b857de763e2a1a67b5cf33a7d

    • SHA1

      6d033484de053b5d1788568efd364ef8c92d0985

    • SHA256

      ca0eb0fc3b97aca8601de95ca56fd06f565a63f7fabc508bf7f9deac8d58ef18

    • SHA512

      035cfd23ead127bace8c7b89b9e99f7dec0a1916015f7e63e7f6d48b2b951ca78c25673b21af735bafc6f78f483f8661666a67135c54b075d0ec91f55322b37c

    • SSDEEP

      6144:Tepyy7cR+ZjD7fAOlRjx3ruLR4Cf75uL8Mzci:Tepr7KEfbpx3ru14Cf78ci

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks