General

  • Target

    bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106

  • Size

    492KB

  • Sample

    240921-h1wvzazhqc

  • MD5

    ae1564b5c50d10489518f1dfe81db85c

  • SHA1

    117daeac12c9c04798bd2914d7645de16a447ab3

  • SHA256

    bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106

  • SHA512

    c1df3b3240633b9424d11dfd9b4cbf54e83d9f22e3e42d2d8aa035b5da7e792c95c661a016889993d5e3312920e5fd9f12f87c083719e83e8dce3725893597fd

  • SSDEEP

    12288:DDMzpnp7b3b3P9PNx2kSof0Dzqvc9KO1K+yPUt7eBodW0ByN7REKm9TsN4RR+HA:/MzBp77b3P9Fvf0

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Targets

    • Target

      bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106

    • Size

      492KB

    • MD5

      ae1564b5c50d10489518f1dfe81db85c

    • SHA1

      117daeac12c9c04798bd2914d7645de16a447ab3

    • SHA256

      bfa8a5073927444304bcd379e5a7d9df13f0ed6e47747a450725c1f4feff5106

    • SHA512

      c1df3b3240633b9424d11dfd9b4cbf54e83d9f22e3e42d2d8aa035b5da7e792c95c661a016889993d5e3312920e5fd9f12f87c083719e83e8dce3725893597fd

    • SSDEEP

      12288:DDMzpnp7b3b3P9PNx2kSof0Dzqvc9KO1K+yPUt7eBodW0ByN7REKm9TsN4RR+HA:/MzBp77b3P9Fvf0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks