General

  • Target

    eca2113019b7612aec08c47bce32c6e9ad3984d69267e651d43485d88118f5e9

  • Size

    305KB

  • Sample

    240424-negf2shb7w

  • MD5

    e357e7455191943dad3b74d88aa5ee93

  • SHA1

    61efcfc80332aa76f177201e0a1252bc333d341a

  • SHA256

    eca2113019b7612aec08c47bce32c6e9ad3984d69267e651d43485d88118f5e9

  • SHA512

    92a5d741618992cdb774d76cabfa0c1dc2de1cab1912153462b9d21c8be3ca3f3bee1c8004043490d3b33aaa122afc3c4264fa03f9bb45a7d5629b09c1697c09

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      eca2113019b7612aec08c47bce32c6e9ad3984d69267e651d43485d88118f5e9

    • Size

      305KB

    • MD5

      e357e7455191943dad3b74d88aa5ee93

    • SHA1

      61efcfc80332aa76f177201e0a1252bc333d341a

    • SHA256

      eca2113019b7612aec08c47bce32c6e9ad3984d69267e651d43485d88118f5e9

    • SHA512

      92a5d741618992cdb774d76cabfa0c1dc2de1cab1912153462b9d21c8be3ca3f3bee1c8004043490d3b33aaa122afc3c4264fa03f9bb45a7d5629b09c1697c09

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks