General

  • Target

    aa6ca1da68b711a534cdae77c39382d6f020679a7ea56e1563bae1a3c9342d0f

  • Size

    720KB

  • Sample

    250204-ys5qxazmbv

  • MD5

    c39dc176515df061ae18dac5290a421b

  • SHA1

    9a40112771df95fd291b3c655200f4526f1b681a

  • SHA256

    aa6ca1da68b711a534cdae77c39382d6f020679a7ea56e1563bae1a3c9342d0f

  • SHA512

    67cef282c93324d5c57d9635415af6721b79b0b2b9ccc1fdda618c2287c78448732378b788452cdc2b8abb592eafc9fac71922c60aae105c311a3e59ab2c1987

  • SSDEEP

    12288:EsZjDQffIkegET9jsIBMNjnNNOhAe/S0JiD2trLwYckJ2U02abFTxJlO6VVUF0mW:NgoTsIBMNjnNNOhAe/S0JU2Z9J9mzlOs

Malware Config

Extracted

Family

redline

Botnet

news

C2

45.144.28.250:26912

Attributes
  • auth_value

    e61921786ce9e1a6b356c82b24803f6d

Targets

    • Target

      aa6ca1da68b711a534cdae77c39382d6f020679a7ea56e1563bae1a3c9342d0f

    • Size

      720KB

    • MD5

      c39dc176515df061ae18dac5290a421b

    • SHA1

      9a40112771df95fd291b3c655200f4526f1b681a

    • SHA256

      aa6ca1da68b711a534cdae77c39382d6f020679a7ea56e1563bae1a3c9342d0f

    • SHA512

      67cef282c93324d5c57d9635415af6721b79b0b2b9ccc1fdda618c2287c78448732378b788452cdc2b8abb592eafc9fac71922c60aae105c311a3e59ab2c1987

    • SSDEEP

      12288:EsZjDQffIkegET9jsIBMNjnNNOhAe/S0JiD2trLwYckJ2U02abFTxJlO6VVUF0mW:NgoTsIBMNjnNNOhAe/S0JU2Z9J9mzlOs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks