General

  • Target

    ed10fcee0434902f9d33cf169b29a2d459fcfa8a9bfad4b825700448a1f2e8e2

  • Size

    306KB

  • Sample

    240424-q44c8aba27

  • MD5

    39521bd9e98a1fb1e98b7dc838d27d1a

  • SHA1

    9b0ae92908be45ab0650a1fa7b4aea21d041d1d3

  • SHA256

    ed10fcee0434902f9d33cf169b29a2d459fcfa8a9bfad4b825700448a1f2e8e2

  • SHA512

    9ec70fc6ef46a3d0ec8c10a32228ef409173bfe2419ea742d58251158d1322d1fbff390a02952f97a0035fcfb4ada986633d34b881e54e0246fd35bf3c8035e0

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      ed10fcee0434902f9d33cf169b29a2d459fcfa8a9bfad4b825700448a1f2e8e2

    • Size

      306KB

    • MD5

      39521bd9e98a1fb1e98b7dc838d27d1a

    • SHA1

      9b0ae92908be45ab0650a1fa7b4aea21d041d1d3

    • SHA256

      ed10fcee0434902f9d33cf169b29a2d459fcfa8a9bfad4b825700448a1f2e8e2

    • SHA512

      9ec70fc6ef46a3d0ec8c10a32228ef409173bfe2419ea742d58251158d1322d1fbff390a02952f97a0035fcfb4ada986633d34b881e54e0246fd35bf3c8035e0

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks