General

  • Target

    cadebe44af11f5468548e01de6bc7d6fc8e1c24d61b052c59145196776b223c5

  • Size

    305KB

  • Sample

    240424-m64j8aha9t

  • MD5

    afeeba0d63f59e32ce9eae8dd054a08e

  • SHA1

    e3994024a9c998c8d038cb1f251e65bff62ea845

  • SHA256

    cadebe44af11f5468548e01de6bc7d6fc8e1c24d61b052c59145196776b223c5

  • SHA512

    3b28f67c11c5bb5c030e6884fd1a0dc1ba8f37ebc10ec2943fdbfce9e33f7f2cfef13a082c21624dacbbbafc5e23d858ac48ecd35ede8e11bfe8b3fb6dc09730

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      cadebe44af11f5468548e01de6bc7d6fc8e1c24d61b052c59145196776b223c5

    • Size

      305KB

    • MD5

      afeeba0d63f59e32ce9eae8dd054a08e

    • SHA1

      e3994024a9c998c8d038cb1f251e65bff62ea845

    • SHA256

      cadebe44af11f5468548e01de6bc7d6fc8e1c24d61b052c59145196776b223c5

    • SHA512

      3b28f67c11c5bb5c030e6884fd1a0dc1ba8f37ebc10ec2943fdbfce9e33f7f2cfef13a082c21624dacbbbafc5e23d858ac48ecd35ede8e11bfe8b3fb6dc09730

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks