General

  • Target

    e8f5bab7d92ed2564d14306fd5fdda1e9909373c924b48d217e78fa4cf0d6688

  • Size

    306KB

  • Sample

    240424-rgmmmabc9s

  • MD5

    55a60614070ceb0f5daf985d69e37e66

  • SHA1

    14d6f7e8cc85850653e3a0d2c87d74e387f2b5f5

  • SHA256

    e8f5bab7d92ed2564d14306fd5fdda1e9909373c924b48d217e78fa4cf0d6688

  • SHA512

    6e3f80c8a3ee4652d150472a88ded94e7e3c5fe436e74850f23ab80704d6065dc514635d02d211d43e859861693c5cc42f768d753803ab99829eaf9745597b9e

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      e8f5bab7d92ed2564d14306fd5fdda1e9909373c924b48d217e78fa4cf0d6688

    • Size

      306KB

    • MD5

      55a60614070ceb0f5daf985d69e37e66

    • SHA1

      14d6f7e8cc85850653e3a0d2c87d74e387f2b5f5

    • SHA256

      e8f5bab7d92ed2564d14306fd5fdda1e9909373c924b48d217e78fa4cf0d6688

    • SHA512

      6e3f80c8a3ee4652d150472a88ded94e7e3c5fe436e74850f23ab80704d6065dc514635d02d211d43e859861693c5cc42f768d753803ab99829eaf9745597b9e

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks