General

  • Target

    a3ebc0cf79ecfb11138604321c95ba71b600ce1c07798747c673311ec7755331

  • Size

    305KB

  • Sample

    240424-pztsjsab6s

  • MD5

    507e4d0830dd44c0f2affe39990c02a6

  • SHA1

    b65a8ae58fc439ddee5c6e968148e0fc9310ed93

  • SHA256

    a3ebc0cf79ecfb11138604321c95ba71b600ce1c07798747c673311ec7755331

  • SHA512

    cec024b30c0c1132c97f4cc2f3aeec5dd61809ca6b8f110bb7abdef5e5e4a6da0881c2a74f76bdc36f8429db175639fbdd8e75df1b3113d134e3c0437e04d970

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      a3ebc0cf79ecfb11138604321c95ba71b600ce1c07798747c673311ec7755331

    • Size

      305KB

    • MD5

      507e4d0830dd44c0f2affe39990c02a6

    • SHA1

      b65a8ae58fc439ddee5c6e968148e0fc9310ed93

    • SHA256

      a3ebc0cf79ecfb11138604321c95ba71b600ce1c07798747c673311ec7755331

    • SHA512

      cec024b30c0c1132c97f4cc2f3aeec5dd61809ca6b8f110bb7abdef5e5e4a6da0881c2a74f76bdc36f8429db175639fbdd8e75df1b3113d134e3c0437e04d970

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks