General

  • Target

    a687bfcf2f6ea52f6c9f72d4f8e7fe18.exe

  • Size

    3.4MB

  • Sample

    230713-eqc4bsfc54

  • MD5

    a687bfcf2f6ea52f6c9f72d4f8e7fe18

  • SHA1

    3037dd2388494c5e1c7b70f6f1a4b5182151b373

  • SHA256

    10240e8eafe3db72419c91f5344f2bc414e79c199153b5b6a1bd753788d6fd4d

  • SHA512

    f4e2d083878cd767d328eec3dee855d5f3def4259051bf9e97eeea19acb54233104c6a2a9dc318d6b647cf0f3d62b49bc0c722feb6c104c67d5ffa89219bed01

  • SSDEEP

    49152:h88EkHFn98KqXxOKgSALQE8MmQKCZFT669WphGu:i8lCKqxQKC+lphGu

Malware Config

Extracted

Family

redline

Botnet

x101

C2

95.164.35.110:25274

Attributes
  • auth_value

    ac84dd6a42323e9f9430a284955f4db3

Targets

    • Target

      a687bfcf2f6ea52f6c9f72d4f8e7fe18.exe

    • Size

      3.4MB

    • MD5

      a687bfcf2f6ea52f6c9f72d4f8e7fe18

    • SHA1

      3037dd2388494c5e1c7b70f6f1a4b5182151b373

    • SHA256

      10240e8eafe3db72419c91f5344f2bc414e79c199153b5b6a1bd753788d6fd4d

    • SHA512

      f4e2d083878cd767d328eec3dee855d5f3def4259051bf9e97eeea19acb54233104c6a2a9dc318d6b647cf0f3d62b49bc0c722feb6c104c67d5ffa89219bed01

    • SSDEEP

      49152:h88EkHFn98KqXxOKgSALQE8MmQKCZFT669WphGu:i8lCKqxQKC+lphGu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks