General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbC16QWJtZXpxWFBGSktGZzBKeVg2UUNpc3k4d3xBQ3Jtc0ttTWM2VXFHcEhwS211WnhUNkRtYW1oOVFxUW1rVjM4dE5EdDU0QzJReW53c2x6QU9MNXhDUTVFSkhlbk9GVVhCUHBwLUE5Q2FOZFRBc29KUWJGc01KcWU1YVBoVE5Wb05aa05fbnRyd096OXl0Q1JHMA&q=https%3A%2F%2Fsites.google.com%2Fview%2Fexecutorpc&v=8Q-uYUuCtmI

  • Sample

    240519-ph86xaha2x

Malware Config

Extracted

Family

redline

C2

194.26.232.43:20746

Targets

    • Target

      https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbC16QWJtZXpxWFBGSktGZzBKeVg2UUNpc3k4d3xBQ3Jtc0ttTWM2VXFHcEhwS211WnhUNkRtYW1oOVFxUW1rVjM4dE5EdDU0QzJReW53c2x6QU9MNXhDUTVFSkhlbk9GVVhCUHBwLUE5Q2FOZFRBc29KUWJGc01KcWU1YVBoVE5Wb05aa05fbnRyd096OXl0Q1JHMA&q=https%3A%2F%2Fsites.google.com%2Fview%2Fexecutorpc&v=8Q-uYUuCtmI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks