General

  • Target

    UltraViolince.exe

  • Size

    388KB

  • Sample

    240919-fxhg3asgjr

  • MD5

    eed18b5e8e965f41241e3bbd9364c101

  • SHA1

    ab91d2db2b030049c8df0a17f60930ccff2e1ea4

  • SHA256

    1dd30d7863a6687e4810a4f8da7e6aae7c12c6633df0517872682fbdfb951d7c

  • SHA512

    2a6e429e2f3c218a330912483f91f67c4c6641644129c8a7a19e3f14f6d988854c2df1833af04dd95bd784fa1b0f217255e1abdc54d57bc2fedd136c0fef0b81

  • SSDEEP

    12288:Fjy9qoZEQc2vKIkOMKTpQMCpkTNk9S4wYU7JKS3Jpx:Fjy9DBaI2mvIkT

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Targets

    • Target

      UltraViolince.exe

    • Size

      388KB

    • MD5

      eed18b5e8e965f41241e3bbd9364c101

    • SHA1

      ab91d2db2b030049c8df0a17f60930ccff2e1ea4

    • SHA256

      1dd30d7863a6687e4810a4f8da7e6aae7c12c6633df0517872682fbdfb951d7c

    • SHA512

      2a6e429e2f3c218a330912483f91f67c4c6641644129c8a7a19e3f14f6d988854c2df1833af04dd95bd784fa1b0f217255e1abdc54d57bc2fedd136c0fef0b81

    • SSDEEP

      12288:Fjy9qoZEQc2vKIkOMKTpQMCpkTNk9S4wYU7JKS3Jpx:Fjy9DBaI2mvIkT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks