General

  • Target

    491ae2b11470142803ca9b1934b2f72e0b814d2658ee89fded29afd329bf9e2f

  • Size

    306KB

  • Sample

    240424-rmjsxsbd24

  • MD5

    6074cbfd16825141e82cdb477ce719d8

  • SHA1

    57c0801bd4ef45f0a048579215c120773347d51e

  • SHA256

    491ae2b11470142803ca9b1934b2f72e0b814d2658ee89fded29afd329bf9e2f

  • SHA512

    ecb2b2136dbee0161a21989f81186f9f80b36833d46e4f2001b3faffc769fcee88f3a93b0021bc50c1eb23041c7351d8002ae2b7ffb60e23bd9fcfdae756ca6c

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      491ae2b11470142803ca9b1934b2f72e0b814d2658ee89fded29afd329bf9e2f

    • Size

      306KB

    • MD5

      6074cbfd16825141e82cdb477ce719d8

    • SHA1

      57c0801bd4ef45f0a048579215c120773347d51e

    • SHA256

      491ae2b11470142803ca9b1934b2f72e0b814d2658ee89fded29afd329bf9e2f

    • SHA512

      ecb2b2136dbee0161a21989f81186f9f80b36833d46e4f2001b3faffc769fcee88f3a93b0021bc50c1eb23041c7351d8002ae2b7ffb60e23bd9fcfdae756ca6c

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks