General

  • Target

    tmp

  • Size

    2.0MB

  • Sample

    220914-1sxreafbaq

  • MD5

    e12876ee494a46dc8dad73a669bb5a8b

  • SHA1

    2ee57bac039a16210fc5f705be4a6d788e0d2280

  • SHA256

    4895d63af52071e09f72f2a1dd3ec093970972dd4b82b6266b67536f24f82eaf

  • SHA512

    a5e472208d64443a7434d043a7995f593c61e2cac8471ef64c165c94fe957fed10a8d7a5cf926d90b5a7097e6368bbddb150f0f1619d6d46d64cb29b81d8bcb5

  • SSDEEP

    49152:H8tw1hZldPSB53pNZs2vLoUE2UOsuQ0lCw9veCAGecw9N9W0f:H8tw1fldKBfNZ1zE2nDh9verN9Nw0f

Malware Config

Extracted

Family

redline

Botnet

TORRENT-SPAM

C2

amrican-sport-live-stream.cc:4581

Attributes
  • auth_value

    b74f5fad3192b62b5be6e643e1fb8595

Targets

    • Target

      tmp

    • Size

      2.0MB

    • MD5

      e12876ee494a46dc8dad73a669bb5a8b

    • SHA1

      2ee57bac039a16210fc5f705be4a6d788e0d2280

    • SHA256

      4895d63af52071e09f72f2a1dd3ec093970972dd4b82b6266b67536f24f82eaf

    • SHA512

      a5e472208d64443a7434d043a7995f593c61e2cac8471ef64c165c94fe957fed10a8d7a5cf926d90b5a7097e6368bbddb150f0f1619d6d46d64cb29b81d8bcb5

    • SSDEEP

      49152:H8tw1hZldPSB53pNZs2vLoUE2UOsuQ0lCw9veCAGecw9N9W0f:H8tw1fldKBfNZ1zE2nDh9verN9Nw0f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks