General

  • Target

    6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27

  • Size

    305KB

  • Sample

    240424-mz62rsha4v

  • MD5

    cda5506857a545008fb0ff1b3be0e25f

  • SHA1

    04a108faee40c382841c082e58663f951376aad0

  • SHA256

    6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27

  • SHA512

    bce3004b627f6f9f564ac2f463ca790b716ca645f4fa1247dc3b680b80c3f55b8b405d27c600575569dc6ca0ae2cf9b93aec11a569664002b53912f9faeebb92

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27

    • Size

      305KB

    • MD5

      cda5506857a545008fb0ff1b3be0e25f

    • SHA1

      04a108faee40c382841c082e58663f951376aad0

    • SHA256

      6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27

    • SHA512

      bce3004b627f6f9f564ac2f463ca790b716ca645f4fa1247dc3b680b80c3f55b8b405d27c600575569dc6ca0ae2cf9b93aec11a569664002b53912f9faeebb92

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks