General

  • Target

    ac8f7a45a57c16b994a015d3cc3c4071.exe

  • Size

    422KB

  • Sample

    231010-2tpmvsae83

  • MD5

    ac8f7a45a57c16b994a015d3cc3c4071

  • SHA1

    0cdd6bfa4db900674addd15d294798417dae5c1a

  • SHA256

    dc5cf343121b5e6ac962622babf726b1ca590760793396176546bbd7420400a3

  • SHA512

    85b1e73b0e916daa145a480275ca68c40ca95ea8b3f0e28d7c97f5c7d203bdc320e73c6c0be3d7ec00da4fb25a7afdb7a39692fa6b9c2c3917079e78489a830e

  • SSDEEP

    3072:QUaWHhdKJMcrUnx+he4VSp4qbrJ1OZIaxzZiqqowg7xrD5XpYwNLx:QUXh4HUnYQSKazUUpN

Malware Config

Extracted

Family

redline

Botnet

5844778753_99

C2

https://pastebin.com/raw/8baCJyMF

Targets

    • Target

      ac8f7a45a57c16b994a015d3cc3c4071.exe

    • Size

      422KB

    • MD5

      ac8f7a45a57c16b994a015d3cc3c4071

    • SHA1

      0cdd6bfa4db900674addd15d294798417dae5c1a

    • SHA256

      dc5cf343121b5e6ac962622babf726b1ca590760793396176546bbd7420400a3

    • SHA512

      85b1e73b0e916daa145a480275ca68c40ca95ea8b3f0e28d7c97f5c7d203bdc320e73c6c0be3d7ec00da4fb25a7afdb7a39692fa6b9c2c3917079e78489a830e

    • SSDEEP

      3072:QUaWHhdKJMcrUnx+he4VSp4qbrJ1OZIaxzZiqqowg7xrD5XpYwNLx:QUXh4HUnYQSKazUUpN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks