General

  • Target

    a881a13ccfc80a316c8a1f82a2bbd2e7f5cef9c253735b9ee98dc951f85670ef

  • Size

    305KB

  • Sample

    240424-n176wshe68

  • MD5

    1815aecf6212db760461e17d65217302

  • SHA1

    285e824ac0319fe92d53b291e584dd82a56ec184

  • SHA256

    a881a13ccfc80a316c8a1f82a2bbd2e7f5cef9c253735b9ee98dc951f85670ef

  • SHA512

    2372c6e43f90a3b3da83bb212f4a5d1f95d61848d3248b6824c3fc8deeff1ecf7455876980147c87f94158912cd1b939d3b6f85a0a68a73344060a182e427787

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      a881a13ccfc80a316c8a1f82a2bbd2e7f5cef9c253735b9ee98dc951f85670ef

    • Size

      305KB

    • MD5

      1815aecf6212db760461e17d65217302

    • SHA1

      285e824ac0319fe92d53b291e584dd82a56ec184

    • SHA256

      a881a13ccfc80a316c8a1f82a2bbd2e7f5cef9c253735b9ee98dc951f85670ef

    • SHA512

      2372c6e43f90a3b3da83bb212f4a5d1f95d61848d3248b6824c3fc8deeff1ecf7455876980147c87f94158912cd1b939d3b6f85a0a68a73344060a182e427787

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks