General

  • Target

    5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484

  • Size

    5.4MB

  • Sample

    221002-17s2rseeem

  • MD5

    ba60e23ac2a9c0b2cd5e7bae7ad5049a

  • SHA1

    359aee0cb29012f0ed373b30383d7e26df710fdc

  • SHA256

    5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484

  • SHA512

    a9f14fadd3b7d84dc9e4a90eab2704a6776b3563976d9de767184c9d323776781edbe2ac1f9077cd77860f86744772a79fc7b0106000b4ba94e03d9d9ffa45ca

  • SSDEEP

    49152:2PFJCvLqOaSTK5ISawpVpVliC8TkxZyh5u4P0zg7vrctB/irpXoXPpS:2PFsjqOaSFUzyPvcj/PA

Malware Config

Extracted

Family

redline

Botnet

JOKER

C2

185.215.113.217:19618

Attributes
  • auth_value

    fbdd1ed5d25f3ea0234594f3484c633d

Targets

    • Target

      5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484

    • Size

      5.4MB

    • MD5

      ba60e23ac2a9c0b2cd5e7bae7ad5049a

    • SHA1

      359aee0cb29012f0ed373b30383d7e26df710fdc

    • SHA256

      5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484

    • SHA512

      a9f14fadd3b7d84dc9e4a90eab2704a6776b3563976d9de767184c9d323776781edbe2ac1f9077cd77860f86744772a79fc7b0106000b4ba94e03d9d9ffa45ca

    • SSDEEP

      49152:2PFJCvLqOaSTK5ISawpVpVliC8TkxZyh5u4P0zg7vrctB/irpXoXPpS:2PFsjqOaSFUzyPvcj/PA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks