General

  • Target

    NEAS.07df78604d9da2c127e1ab1b9dcf77cece0d2ba536746a7615c65d6689debeb8.exe

  • Size

    219KB

  • Sample

    231115-t3wtjadg2w

  • MD5

    1418cb4b22c17874118882a905fe3261

  • SHA1

    206351bd9083c7401a7c839d7e2ec26347271007

  • SHA256

    07df78604d9da2c127e1ab1b9dcf77cece0d2ba536746a7615c65d6689debeb8

  • SHA512

    998a66f6bad34b75f23a3fdfaf92b72385e9455a03b42700d64801b7ac027cfe2fcecdd412daa2c570c8c3f880df4bc3e5fd382a40e2e7c9791ffebcdd127707

  • SSDEEP

    6144:S+DXgP71Ngcthrfu8k0LO1SolmOiC1da:S+LuNgcthr/kzlmOiC1da

Malware Config

Extracted

Family

redline

Botnet

PERSOM-1112

C2

194.49.94.77:22888

Targets

    • Target

      NEAS.07df78604d9da2c127e1ab1b9dcf77cece0d2ba536746a7615c65d6689debeb8.exe

    • Size

      219KB

    • MD5

      1418cb4b22c17874118882a905fe3261

    • SHA1

      206351bd9083c7401a7c839d7e2ec26347271007

    • SHA256

      07df78604d9da2c127e1ab1b9dcf77cece0d2ba536746a7615c65d6689debeb8

    • SHA512

      998a66f6bad34b75f23a3fdfaf92b72385e9455a03b42700d64801b7ac027cfe2fcecdd412daa2c570c8c3f880df4bc3e5fd382a40e2e7c9791ffebcdd127707

    • SSDEEP

      6144:S+DXgP71Ngcthrfu8k0LO1SolmOiC1da:S+LuNgcthr/kzlmOiC1da

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks