General

  • Target

    tmp

  • Size

    304KB

  • Sample

    240408-s7vxcsgd3y

  • MD5

    2b3db8d53b4fe69415dc9acf8665ce8c

  • SHA1

    a96422212cf0c530d9a39fec37b8de0ac188e240

  • SHA256

    507c51a6fdb07a8903a8e9bd926af920079f0b60587211d6cad10d32f0c76f7d

  • SHA512

    a9dffe7f62e0f60748a0fadb242a3117f92845e33ae90354807c875485a07db02c602d6ddf6905cdf8ef71cf208f09059a06ac3946c3e34ce5c54aeac569b669

  • SSDEEP

    3072:kq6EgY6i2rUjNlU5wP/q4MQArwC/hfTA9tmSibiFcZqf7D34leqiOLibBOS:PqY6iUwP3MxhhfTAzm5iFcZqf7DIvL

Malware Config

Extracted

Family

redline

Botnet

Hehe

C2

62.122.184.51:6017

Targets

    • Target

      tmp

    • Size

      304KB

    • MD5

      2b3db8d53b4fe69415dc9acf8665ce8c

    • SHA1

      a96422212cf0c530d9a39fec37b8de0ac188e240

    • SHA256

      507c51a6fdb07a8903a8e9bd926af920079f0b60587211d6cad10d32f0c76f7d

    • SHA512

      a9dffe7f62e0f60748a0fadb242a3117f92845e33ae90354807c875485a07db02c602d6ddf6905cdf8ef71cf208f09059a06ac3946c3e34ce5c54aeac569b669

    • SSDEEP

      3072:kq6EgY6i2rUjNlU5wP/q4MQArwC/hfTA9tmSibiFcZqf7D34leqiOLibBOS:PqY6iUwP3MxhhfTAzm5iFcZqf7DIvL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks