General

  • Target

    dhfdghfg.txt

  • Size

    367B

  • Sample

    240221-qfnb4aff9t

  • MD5

    2cea96feedc8ab4ca821cef05272000d

  • SHA1

    a81bb13035dcefb72dbcbf391cef3161556ebcf1

  • SHA256

    77762dcc53fdded6721c721958863e71c6b9f8228b5fdc2298ac6cc3a991289d

  • SHA512

    f5c69931f74975a32c73a7a276a1757485c673ffc2586ae95b1eacf1d92ab57ae523089d8dfc9808b38b482f777a345e23a828f5b0d0279bea9eb42449498c07

Malware Config

Extracted

Family

redline

Botnet

@hitok4111

C2

45.15.156.167:80

Targets

    • Target

      dhfdghfg.txt

    • Size

      367B

    • MD5

      2cea96feedc8ab4ca821cef05272000d

    • SHA1

      a81bb13035dcefb72dbcbf391cef3161556ebcf1

    • SHA256

      77762dcc53fdded6721c721958863e71c6b9f8228b5fdc2298ac6cc3a991289d

    • SHA512

      f5c69931f74975a32c73a7a276a1757485c673ffc2586ae95b1eacf1d92ab57ae523089d8dfc9808b38b482f777a345e23a828f5b0d0279bea9eb42449498c07

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks