General

  • Target

    479a3cdbeb1e5a01d8c538105aa8a39f580fddd0e4f963308714f42edb780a69

  • Size

    304KB

  • Sample

    240424-mya8psha74

  • MD5

    68fe3505fc2a137b7b1eda616b1cd51a

  • SHA1

    4fb95f0d59df1d84ee1f801dffc2622c5e3a8112

  • SHA256

    479a3cdbeb1e5a01d8c538105aa8a39f580fddd0e4f963308714f42edb780a69

  • SHA512

    605cd30956b3eb97df0c02d08abb27af1a36d995dd0b0ddcd21aa666d806ab8e23bdfb03b20cf66619dc98d9a4ec44c5ea0662801678848ed52c4717fb07c5ae

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      479a3cdbeb1e5a01d8c538105aa8a39f580fddd0e4f963308714f42edb780a69

    • Size

      304KB

    • MD5

      68fe3505fc2a137b7b1eda616b1cd51a

    • SHA1

      4fb95f0d59df1d84ee1f801dffc2622c5e3a8112

    • SHA256

      479a3cdbeb1e5a01d8c538105aa8a39f580fddd0e4f963308714f42edb780a69

    • SHA512

      605cd30956b3eb97df0c02d08abb27af1a36d995dd0b0ddcd21aa666d806ab8e23bdfb03b20cf66619dc98d9a4ec44c5ea0662801678848ed52c4717fb07c5ae

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks