General

  • Target

    d358c0ed06850d955d3e3e82433f56d5028cbc351fc67c3ea88a3eaf6be5f304

  • Size

    305KB

  • Sample

    240424-m7bwlaha9x

  • MD5

    5e0d3ba30722840b5e369890a1547e41

  • SHA1

    341996107b4190b7e5d34af9d821a71d1d4c026e

  • SHA256

    d358c0ed06850d955d3e3e82433f56d5028cbc351fc67c3ea88a3eaf6be5f304

  • SHA512

    a0b73b1558d828319c9b15008930ed131f9f1cbac0f955263ebca1aa137cd3281e9b78eefa339537b4888974def0cb763ae7b6eb4442bbccb15f73c456458cb3

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      d358c0ed06850d955d3e3e82433f56d5028cbc351fc67c3ea88a3eaf6be5f304

    • Size

      305KB

    • MD5

      5e0d3ba30722840b5e369890a1547e41

    • SHA1

      341996107b4190b7e5d34af9d821a71d1d4c026e

    • SHA256

      d358c0ed06850d955d3e3e82433f56d5028cbc351fc67c3ea88a3eaf6be5f304

    • SHA512

      a0b73b1558d828319c9b15008930ed131f9f1cbac0f955263ebca1aa137cd3281e9b78eefa339537b4888974def0cb763ae7b6eb4442bbccb15f73c456458cb3

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks