General

  • Target

    Booking-Confirmation-id4399239.zip

  • Size

    3.3MB

  • Sample

    230109-lyafqsdg64

  • MD5

    c4ca003fe012d34af300e8f58e0571fb

  • SHA1

    75f978da087392eba06515c0864915793cb9ba25

  • SHA256

    013f6365120444e5931f778ebcbf8732613e4b0cb6a571e176d4f873efdac34f

  • SHA512

    a50a03b1e1205f50e7dcfe146793658d50f0f213c86e949031d0120b4e59fed0b31ef3c5d2a854c8dfde1c1191b8a1f71e60543a438f5baa4d6475d5df858a60

  • SSDEEP

    24576:Mo/VQ7/q+Qqqv+U87Z9u4u1Oo98TyPDBzV8n2dXGHQd/2us:Mv7GqE+zNdu18WLBzV8ncWH0s

Malware Config

Extracted

Family

redline

Botnet

66666666666666666666666

C2

77.73.134.13:12785

Attributes
  • auth_value

    1099ffc7ba156d512c6f6a5d2d747d65

Targets

    • Target

      Booking-Confirmation-id4399239.exe

    • Size

      706.8MB

    • MD5

      707f7981a5ff48a61e1d4b50ea896a83

    • SHA1

      bfaa4643151b84b63a75610b5125176658ee1d2d

    • SHA256

      4f1c1565afc782e688945c07a486205c59d43a98ae577c5d065bfed9a47a983d

    • SHA512

      731f39df051dccc55b55e98a5e73c1e1b17f6921d17ea7f62e3b8d717f3c06aaba600ba17810029ae2337f28ae5bdebd1eea965a4881eb71919449a75e822aa4

    • SSDEEP

      24576:lxGVGbcPfeILDHZiKGSS71H4UuLQo3wTebDE1Tl99QQdt7Pp:nbueILzGN5PubwKHE1Tri0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks