General

  • Target

    s.txt

  • Size

    28B

  • Sample

    240919-hb14dsvfpc

  • MD5

    800ef171e77b44495424bf7ec2bf9b77

  • SHA1

    5bfb51f1d129c8c000eaf93d70fa94595b15d264

  • SHA256

    110579ac4c9b5c6e33281d0585cc9014bea7a8bb9adb7d35313f9638c821abda

  • SHA512

    76846df885f721454530d6fd417b2e2b7afc92d75d154487eb3bd27deed14c59328391cf1fdbff899732728310e50c250eab346a33de80a259f66b374b6d7068

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Targets

    • Target

      s.txt

    • Size

      28B

    • MD5

      800ef171e77b44495424bf7ec2bf9b77

    • SHA1

      5bfb51f1d129c8c000eaf93d70fa94595b15d264

    • SHA256

      110579ac4c9b5c6e33281d0585cc9014bea7a8bb9adb7d35313f9638c821abda

    • SHA512

      76846df885f721454530d6fd417b2e2b7afc92d75d154487eb3bd27deed14c59328391cf1fdbff899732728310e50c250eab346a33de80a259f66b374b6d7068

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks