General

  • Target

    f9a4cf9d855cbb24f9d16a4d7da087065e9329a5560d1e92a8e099697d23e20e

  • Size

    305KB

  • Sample

    240424-m3cx4aha5x

  • MD5

    0d9f6e4534612f8c6e70f5f9c8c43da1

  • SHA1

    048b9b49a5a22867131d514e12fa018de67f2092

  • SHA256

    f9a4cf9d855cbb24f9d16a4d7da087065e9329a5560d1e92a8e099697d23e20e

  • SHA512

    23d33ef938675436b16fb37fce8d5dc9afcabb7dbb9392bfcccca17f5f5f2bb4fd89187fbf5a486431a736fa8b4c861954b9f6901827b237e234f4ae4fbbcf77

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      f9a4cf9d855cbb24f9d16a4d7da087065e9329a5560d1e92a8e099697d23e20e

    • Size

      305KB

    • MD5

      0d9f6e4534612f8c6e70f5f9c8c43da1

    • SHA1

      048b9b49a5a22867131d514e12fa018de67f2092

    • SHA256

      f9a4cf9d855cbb24f9d16a4d7da087065e9329a5560d1e92a8e099697d23e20e

    • SHA512

      23d33ef938675436b16fb37fce8d5dc9afcabb7dbb9392bfcccca17f5f5f2bb4fd89187fbf5a486431a736fa8b4c861954b9f6901827b237e234f4ae4fbbcf77

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks