General

  • Target

    774a1784cb6de5887eaf953adc1c604d89784ad3f48484a3be931b205d1eb54b

  • Size

    301KB

  • Sample

    240326-2egnpsea57

  • MD5

    fb95da8e2b70c03b780e71a1d08039b7

  • SHA1

    a10d69ba6482e965a26e3117798c88999e209619

  • SHA256

    774a1784cb6de5887eaf953adc1c604d89784ad3f48484a3be931b205d1eb54b

  • SHA512

    0cdd413ffbcc3d7c4ea634d60bba689ffb1108513db5631e60399c048dcfb3c3d5cfec46d983e03e1bbfb86bb4f990d00e614957d0572f2ec7e94d9a8c815e45

  • SSDEEP

    3072:gqK8kKqcIkCd6kTfZjTHlvVy0r6TZnML/JcZqf7D34leqiOLCbBOg:jBkKqLdZjTHbuTZMVcZqf7DIvL

Malware Config

Extracted

Family

redline

Botnet

jok

C2

185.215.113.67:26260

Targets

    • Target

      774a1784cb6de5887eaf953adc1c604d89784ad3f48484a3be931b205d1eb54b

    • Size

      301KB

    • MD5

      fb95da8e2b70c03b780e71a1d08039b7

    • SHA1

      a10d69ba6482e965a26e3117798c88999e209619

    • SHA256

      774a1784cb6de5887eaf953adc1c604d89784ad3f48484a3be931b205d1eb54b

    • SHA512

      0cdd413ffbcc3d7c4ea634d60bba689ffb1108513db5631e60399c048dcfb3c3d5cfec46d983e03e1bbfb86bb4f990d00e614957d0572f2ec7e94d9a8c815e45

    • SSDEEP

      3072:gqK8kKqcIkCd6kTfZjTHlvVy0r6TZnML/JcZqf7D34leqiOLCbBOg:jBkKqLdZjTHbuTZMVcZqf7DIvL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks