General

  • Target

    03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b

  • Size

    177KB

  • Sample

    221127-16newscg29

  • MD5

    117b064fb02e75f65ab71315e46e5618

  • SHA1

    8bdc3f169d4d97401c300ff30fbc4c124e709af6

  • SHA256

    03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b

  • SHA512

    9f480e798f24b69a385001f298196ddd7a00fbbc5887c6c862e8c28776df29c509035c0cf237fe7c5fd831c73f4648040db15c0817ff4864481cba4afe414993

  • SSDEEP

    3072:sr85CTK/Pi74wINPcWF1HERPhhESSUlGYO/ZMTFZl+KIGTqe:k9u/TEmEphhwYMZMBZlhI/e

Malware Config

Extracted

Family

redline

Botnet

1.0

C2

149.28.133.54:4921

Attributes
  • auth_value

    84aa9e53350b3b2df39f0f1f4f6465a1

Targets

    • Target

      03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b

    • Size

      177KB

    • MD5

      117b064fb02e75f65ab71315e46e5618

    • SHA1

      8bdc3f169d4d97401c300ff30fbc4c124e709af6

    • SHA256

      03d3c0ec58caf5fa228384daa9d99f0bc0d44b3c02ee911a4572f8e4f5fa728b

    • SHA512

      9f480e798f24b69a385001f298196ddd7a00fbbc5887c6c862e8c28776df29c509035c0cf237fe7c5fd831c73f4648040db15c0817ff4864481cba4afe414993

    • SSDEEP

      3072:sr85CTK/Pi74wINPcWF1HERPhhESSUlGYO/ZMTFZl+KIGTqe:k9u/TEmEphhwYMZMBZlhI/e

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks