General

  • Target

    c346409d0a2e2ab8e674c38d1411ad9a6895fd144231778ea185818cfd932949

  • Size

    473KB

  • Sample

    240214-fhpmtsag34

  • MD5

    a030b8e908d9a6ecd573d4cbc01f6fef

  • SHA1

    34f814b6d26b3d6f50385096cb9250c77de8d96d

  • SHA256

    c346409d0a2e2ab8e674c38d1411ad9a6895fd144231778ea185818cfd932949

  • SHA512

    a086fdc873e86a40fd4002b2514bee1d99d30d0d7b5eee5d81895f0c822230e3dbed8cc6ce019332d58f3a6cf3d019705a0d4b4692402d0b1753190885c74d91

  • SSDEEP

    12288:kh1Fk70TnvjcL/MiKP6KXUpfvehewbskxyUNYpKLafpHNZk:Kk70TrcrMTPhXUpfveUwbsKJbWfpHLk

Malware Config

Extracted

Family

redline

Botnet

LiveTraffic

C2

20.79.30.95:33223

Targets

    • Target

      c346409d0a2e2ab8e674c38d1411ad9a6895fd144231778ea185818cfd932949

    • Size

      473KB

    • MD5

      a030b8e908d9a6ecd573d4cbc01f6fef

    • SHA1

      34f814b6d26b3d6f50385096cb9250c77de8d96d

    • SHA256

      c346409d0a2e2ab8e674c38d1411ad9a6895fd144231778ea185818cfd932949

    • SHA512

      a086fdc873e86a40fd4002b2514bee1d99d30d0d7b5eee5d81895f0c822230e3dbed8cc6ce019332d58f3a6cf3d019705a0d4b4692402d0b1753190885c74d91

    • SSDEEP

      12288:kh1Fk70TnvjcL/MiKP6KXUpfvehewbskxyUNYpKLafpHNZk:Kk70TrcrMTPhXUpfveUwbsKJbWfpHLk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks