General

  • Target

    e75f2c4950175371c8d557afa255bf05e3ba8f34d8d8c9d9aef04d408c88d5f3

  • Size

    306KB

  • Sample

    240424-r8q45abh42

  • MD5

    d1b287156864c4b09deaeef7da6df68a

  • SHA1

    675562023a4fb00681be4c012fe363335d916ec2

  • SHA256

    e75f2c4950175371c8d557afa255bf05e3ba8f34d8d8c9d9aef04d408c88d5f3

  • SHA512

    e17695d6a0796e7321a4d54731c20cf3b09e2a5b25f4a4141fd0b4be0493bb35836e8051e2cb4fa91bf1755381a7c16a4d31f0e11dd7b9c28edd187af919595f

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      e75f2c4950175371c8d557afa255bf05e3ba8f34d8d8c9d9aef04d408c88d5f3

    • Size

      306KB

    • MD5

      d1b287156864c4b09deaeef7da6df68a

    • SHA1

      675562023a4fb00681be4c012fe363335d916ec2

    • SHA256

      e75f2c4950175371c8d557afa255bf05e3ba8f34d8d8c9d9aef04d408c88d5f3

    • SHA512

      e17695d6a0796e7321a4d54731c20cf3b09e2a5b25f4a4141fd0b4be0493bb35836e8051e2cb4fa91bf1755381a7c16a4d31f0e11dd7b9c28edd187af919595f

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks