General

  • Target

    WeaverV2.exe

  • Size

    340KB

  • Sample

    240525-yyefxagg5t

  • MD5

    d141432ff2210bcbd754b1ee53eba033

  • SHA1

    7312d57236bbad8f2011e6e7ee6d90bfaa6fb3e6

  • SHA256

    72df011a0d070995fcb6337bca285b3baeb03332753c8cce09c5729205513a15

  • SHA512

    a830f6e6c3fd4becf376fcaa9be5c0e6031f3de0d0de26076f5410e8b56e80ee70d705826da43a0e675b78709d4d832d3270dc83afa8ad79316bb53fca039143

  • SSDEEP

    6144:6/prWijUFYVz2uIkRuq3RVaNWi3wd9S6/KyRZ9WnXkbBfmvDTw9:E6iwGYwuKVus9S6/KyRZ9WnXkbBfmvDw

Malware Config

Extracted

Family

redline

C2

194.26.232.43:20746

Targets

    • Target

      WeaverV2.exe

    • Size

      340KB

    • MD5

      d141432ff2210bcbd754b1ee53eba033

    • SHA1

      7312d57236bbad8f2011e6e7ee6d90bfaa6fb3e6

    • SHA256

      72df011a0d070995fcb6337bca285b3baeb03332753c8cce09c5729205513a15

    • SHA512

      a830f6e6c3fd4becf376fcaa9be5c0e6031f3de0d0de26076f5410e8b56e80ee70d705826da43a0e675b78709d4d832d3270dc83afa8ad79316bb53fca039143

    • SSDEEP

      6144:6/prWijUFYVz2uIkRuq3RVaNWi3wd9S6/KyRZ9WnXkbBfmvDTw9:E6iwGYwuKVus9S6/KyRZ9WnXkbBfmvDw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks