General

  • Target

    fcd95d57b8c1d2f8cd950ec069ea2610613ab7c3761d17947352e8f108b6129f

  • Size

    304KB

  • Sample

    240424-myvbksha76

  • MD5

    128ca778ecc67d8e1cb777d872708870

  • SHA1

    22f2151c53c6d0c0d48d455dce0f8bab9f63e883

  • SHA256

    fcd95d57b8c1d2f8cd950ec069ea2610613ab7c3761d17947352e8f108b6129f

  • SHA512

    2ac647a1f42bb073270894e36c4392c4601cd776560cee98267b989aa4e0bc4d89da47fa8573e98f557270f7a8924377e9a952ec25484d0111dc128d34870f22

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      fcd95d57b8c1d2f8cd950ec069ea2610613ab7c3761d17947352e8f108b6129f

    • Size

      304KB

    • MD5

      128ca778ecc67d8e1cb777d872708870

    • SHA1

      22f2151c53c6d0c0d48d455dce0f8bab9f63e883

    • SHA256

      fcd95d57b8c1d2f8cd950ec069ea2610613ab7c3761d17947352e8f108b6129f

    • SHA512

      2ac647a1f42bb073270894e36c4392c4601cd776560cee98267b989aa4e0bc4d89da47fa8573e98f557270f7a8924377e9a952ec25484d0111dc128d34870f22

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks