General

  • Target

    9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a

  • Size

    2.3MB

  • Sample

    230329-faxcpsgd41

  • MD5

    8f3e8fa1ba9c4c10680a9135a2ab6724

  • SHA1

    40786bac389dcd6b175f9973b81e706cdb9806cf

  • SHA256

    9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a

  • SHA512

    851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836

  • SSDEEP

    24576:7NLUDs+Be2DXO8Xl0a5qMKtu1Dze6HDpLrb296zoB1GqHesQkKOR+kUJMaosMQbm:7ZgrRrO8Xl0ME1il6QgaZRHdlB

Malware Config

Extracted

Family

redline

Botnet

@DridexxSupport

C2

188.212.124.133:16312

Attributes
  • auth_value

    e5a22ab56ec9b2f984d6e4504915843a

Targets

    • Target

      9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a

    • Size

      2.3MB

    • MD5

      8f3e8fa1ba9c4c10680a9135a2ab6724

    • SHA1

      40786bac389dcd6b175f9973b81e706cdb9806cf

    • SHA256

      9c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a

    • SHA512

      851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836

    • SSDEEP

      24576:7NLUDs+Be2DXO8Xl0a5qMKtu1Dze6HDpLrb296zoB1GqHesQkKOR+kUJMaosMQbm:7ZgrRrO8Xl0ME1il6QgaZRHdlB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks