General

  • Target

    PicturesDrawings.tar

  • Size

    5.6MB

  • Sample

    221125-q6dwcafc9s

  • MD5

    01c1660c5c993d05086ff4399d7a039a

  • SHA1

    0b98de90252028ffc429cdc84c0c8bb190b5587a

  • SHA256

    672b7528894303d62f523e6136da0bd59c9bc9b0f9790a90dff0919c002f6ec5

  • SHA512

    59f107636679b9102db9ce20758e957fa3ea16afe9d775f2b824694c0e5422ec55e8bf13283ca27bc0dd1c2c1ca542d5400ef8d1a14cc18737d9777ddb4b05a6

  • SSDEEP

    98304:0fgtQICDtPfeE/jowqK5LN1KQ0oTh2M9QrABlolllOr3pDqoGZvVYm:0yQICteErownP0oTcMsABqlglMZl

Malware Config

Extracted

Family

redline

Botnet

Favour

C2

149.56.226.65:5985

Targets

    • Target

      853224ac39d813dbb9e806ab0c12f04a.exe

    • Size

      5.6MB

    • MD5

      c912359df1edfea3b02e6f05925ecd1c

    • SHA1

      b08421bb53fa7f1bc59410e73b931dc5122933c7

    • SHA256

      5a07bc69ad4a2437e2a2ee9913a60fc6f147a895ea5d82bc2c1e3103a0b54454

    • SHA512

      ccb583e7e8376d12a8b90437c128168eb44923a8ad65bd8444430028b076a73cf2c8e0becab5b24141cfa68d052f31f1919e6598c614f85e3bd5f6102fa663ab

    • SSDEEP

      98304:/fgtQICDtPfeE/jowqK5LN1KQ0oTh2M9QrABlolllOr3pDqoGZvVYmj:/yQICteErownP0oTcMsABqlglMZlj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks