General

  • Target

    6ac77b3a801b49f8131b8f6fa0fa399ff173e0dc6f08a415bbb859c80fd08558

  • Size

    306KB

  • Sample

    240424-qnk7psaf5x

  • MD5

    965609acb4faf0ca4368ff985613aaca

  • SHA1

    6f8018f65782592278d7019f34e34a30f515ef58

  • SHA256

    6ac77b3a801b49f8131b8f6fa0fa399ff173e0dc6f08a415bbb859c80fd08558

  • SHA512

    3474e0aa3df4088954a5d94d152b892a01ee587c685eec2eec0ccede49db7aafc51171b8dd8497421dbc63423f64e7b71b9205af84eaa49a0e7eb80dc5f91dd9

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      6ac77b3a801b49f8131b8f6fa0fa399ff173e0dc6f08a415bbb859c80fd08558

    • Size

      306KB

    • MD5

      965609acb4faf0ca4368ff985613aaca

    • SHA1

      6f8018f65782592278d7019f34e34a30f515ef58

    • SHA256

      6ac77b3a801b49f8131b8f6fa0fa399ff173e0dc6f08a415bbb859c80fd08558

    • SHA512

      3474e0aa3df4088954a5d94d152b892a01ee587c685eec2eec0ccede49db7aafc51171b8dd8497421dbc63423f64e7b71b9205af84eaa49a0e7eb80dc5f91dd9

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks