General

  • Target

    TRXLoader.exe

  • Size

    167KB

  • Sample

    230803-ndwjksda27

  • MD5

    e49b5c4669b85228518fbedfa92ba950

  • SHA1

    be352f390039b4db42bafff6caf5662fc278fa52

  • SHA256

    4992be3d3767710e05ba63f6d105f8b2aaf0216db4a35b6a4e2056248c59683b

  • SHA512

    14d5c8c923e6995b6426950539a9c593f742f238804c604d0806303e38d0f5e8a87e858d1f7242510cef5efac105040f9b57627a0779d760be31f99370294903

  • SSDEEP

    3072:ScX9GCUkJPmSyYmYTHDb4S1I8E7bbKDhVLI8bxKI:SctGC/JPwYMS1TAI

Malware Config

Extracted

Family

redline

Botnet

2074014949_99

C2

https://pastebin.com/raw/tnW31tPp

Targets

    • Target

      TRXLoader.exe

    • Size

      167KB

    • MD5

      e49b5c4669b85228518fbedfa92ba950

    • SHA1

      be352f390039b4db42bafff6caf5662fc278fa52

    • SHA256

      4992be3d3767710e05ba63f6d105f8b2aaf0216db4a35b6a4e2056248c59683b

    • SHA512

      14d5c8c923e6995b6426950539a9c593f742f238804c604d0806303e38d0f5e8a87e858d1f7242510cef5efac105040f9b57627a0779d760be31f99370294903

    • SSDEEP

      3072:ScX9GCUkJPmSyYmYTHDb4S1I8E7bbKDhVLI8bxKI:SctGC/JPwYMS1TAI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks