General

  • Target

    ab250eac645511803a73dd280abe88f72de04bc1e9819525b371eccb12f9fd4a

  • Size

    305KB

  • Sample

    240424-m1fk7sha4w

  • MD5

    8753ab2dfd2b45af3fc6bbac94e1b789

  • SHA1

    f97b3763c3853c4a854f9f2c5eb5d2e65714a50b

  • SHA256

    ab250eac645511803a73dd280abe88f72de04bc1e9819525b371eccb12f9fd4a

  • SHA512

    515196a7d97149a7339445b4e57c16ea277a36b143cd8aa1f547cbb1bf21d856444c93af46e02ab72511afd623dc8464e18f30d37e9aaf71689047e231b98139

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      ab250eac645511803a73dd280abe88f72de04bc1e9819525b371eccb12f9fd4a

    • Size

      305KB

    • MD5

      8753ab2dfd2b45af3fc6bbac94e1b789

    • SHA1

      f97b3763c3853c4a854f9f2c5eb5d2e65714a50b

    • SHA256

      ab250eac645511803a73dd280abe88f72de04bc1e9819525b371eccb12f9fd4a

    • SHA512

      515196a7d97149a7339445b4e57c16ea277a36b143cd8aa1f547cbb1bf21d856444c93af46e02ab72511afd623dc8464e18f30d37e9aaf71689047e231b98139

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks