General

  • Target

    6195a3c9648da3f992dc8c3b0b96a0169916c5db5d9ee78983a693d8f37d135c.exe

  • Size

    1.6MB

  • Sample

    240628-bssd9atbrf

  • MD5

    1238ef00e11f44c07643ce7a216e4c38

  • SHA1

    e70f86cefc7616f665b2c50b08c1b82a8bb9bdae

  • SHA256

    6195a3c9648da3f992dc8c3b0b96a0169916c5db5d9ee78983a693d8f37d135c

  • SHA512

    5dd4fe8f54c5075669a5910f47cc812a682d72676f6896432f248e5c970a57c3874909ddd82ace1e5da200d6914a751a0796351e6de42ee3e483d6eeaedea9f0

  • SSDEEP

    49152:FTB9HVBO0Z9rqyI44HppuzGxHHYh1PYHlvsz:FTB00Z92yVG/uzGNmP

Malware Config

Extracted

Family

redline

Botnet

@nmrzv88

C2

94.228.166.68:80

Targets

    • Target

      6195a3c9648da3f992dc8c3b0b96a0169916c5db5d9ee78983a693d8f37d135c.exe

    • Size

      1.6MB

    • MD5

      1238ef00e11f44c07643ce7a216e4c38

    • SHA1

      e70f86cefc7616f665b2c50b08c1b82a8bb9bdae

    • SHA256

      6195a3c9648da3f992dc8c3b0b96a0169916c5db5d9ee78983a693d8f37d135c

    • SHA512

      5dd4fe8f54c5075669a5910f47cc812a682d72676f6896432f248e5c970a57c3874909ddd82ace1e5da200d6914a751a0796351e6de42ee3e483d6eeaedea9f0

    • SSDEEP

      49152:FTB9HVBO0Z9rqyI44HppuzGxHHYh1PYHlvsz:FTB00Z92yVG/uzGNmP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks