General

  • Target

    a20fa4d29f88de16e17e7382e341608ae9d10742412a9d15d26bde9f69b7e2de

  • Size

    304KB

  • Sample

    240424-mvwp8sha62

  • MD5

    7c5aec157c329dee46436b7c605d29c0

  • SHA1

    f641f2cf2cdca9ffe9a02794ab148bd370bc6f83

  • SHA256

    a20fa4d29f88de16e17e7382e341608ae9d10742412a9d15d26bde9f69b7e2de

  • SHA512

    1960095de13b9d570c2c3d75c7f07d1655f53e3685fdac07ea46e43b0de9ef89661a057af5c027d6c932c4b6fbed0369082d2e70fb9f194c4cb70962b9cd821e

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      a20fa4d29f88de16e17e7382e341608ae9d10742412a9d15d26bde9f69b7e2de

    • Size

      304KB

    • MD5

      7c5aec157c329dee46436b7c605d29c0

    • SHA1

      f641f2cf2cdca9ffe9a02794ab148bd370bc6f83

    • SHA256

      a20fa4d29f88de16e17e7382e341608ae9d10742412a9d15d26bde9f69b7e2de

    • SHA512

      1960095de13b9d570c2c3d75c7f07d1655f53e3685fdac07ea46e43b0de9ef89661a057af5c027d6c932c4b6fbed0369082d2e70fb9f194c4cb70962b9cd821e

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks