General

  • Target

    1882b20a154c69e2e5ba570fc8dccddbd9ba9a521efc014625610662b1e8635d

  • Size

    305KB

  • Sample

    240424-pbwl8shf7y

  • MD5

    676582f861ba981c4ba2425e2bb88c1a

  • SHA1

    44b7d498dee7651540976b5ec0164463f6194c14

  • SHA256

    1882b20a154c69e2e5ba570fc8dccddbd9ba9a521efc014625610662b1e8635d

  • SHA512

    656eab137f0a06c1cd6fb4d54e77733a08266ef012fc75cb6a66f71d5e1bbe5e4c06252dae379513d85a1f0358c5f978714a06c8fa3887f19cfdbd670c321e44

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      1882b20a154c69e2e5ba570fc8dccddbd9ba9a521efc014625610662b1e8635d

    • Size

      305KB

    • MD5

      676582f861ba981c4ba2425e2bb88c1a

    • SHA1

      44b7d498dee7651540976b5ec0164463f6194c14

    • SHA256

      1882b20a154c69e2e5ba570fc8dccddbd9ba9a521efc014625610662b1e8635d

    • SHA512

      656eab137f0a06c1cd6fb4d54e77733a08266ef012fc75cb6a66f71d5e1bbe5e4c06252dae379513d85a1f0358c5f978714a06c8fa3887f19cfdbd670c321e44

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks