General

  • Target

    6a15e871857f4caa15645574d67d4f8bd06518a3de93352ce411a3264aa2c222

  • Size

    305KB

  • Sample

    240424-nmgrsahc97

  • MD5

    c919c638037b43b1cb39ee990a4e76f6

  • SHA1

    bcb3f6fc71015e0305324c99b833309581180d73

  • SHA256

    6a15e871857f4caa15645574d67d4f8bd06518a3de93352ce411a3264aa2c222

  • SHA512

    0fed46297a7d3178ef256f880a9a50ce2ffbf9c27793d8b17b3691f12ae3e4361e08cff5c62adc6cb06f02080685a29812e4893fb4dc9bb2f78af2705fe6289e

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      6a15e871857f4caa15645574d67d4f8bd06518a3de93352ce411a3264aa2c222

    • Size

      305KB

    • MD5

      c919c638037b43b1cb39ee990a4e76f6

    • SHA1

      bcb3f6fc71015e0305324c99b833309581180d73

    • SHA256

      6a15e871857f4caa15645574d67d4f8bd06518a3de93352ce411a3264aa2c222

    • SHA512

      0fed46297a7d3178ef256f880a9a50ce2ffbf9c27793d8b17b3691f12ae3e4361e08cff5c62adc6cb06f02080685a29812e4893fb4dc9bb2f78af2705fe6289e

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks