General

  • Target

    110a68e6e2da385d1d4c828900c83658d7280f7dd04dabd0837adba5def8a41d

  • Size

    306KB

  • Sample

    240424-rpjwpsbe3y

  • MD5

    c52b3d7f0e3f4e20727afd090153d14f

  • SHA1

    3d16cf91c34c05e67eb990cc841a5026aa3d409f

  • SHA256

    110a68e6e2da385d1d4c828900c83658d7280f7dd04dabd0837adba5def8a41d

  • SHA512

    6f1a3a6bff0de09a20368bc5a977e043951ec394feb0016f4c8ab2630ffd45a5b9a08078e5c6d0bc3534cd5fb1784743baa24e76c98ca84169c2b34eaa3f8377

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      110a68e6e2da385d1d4c828900c83658d7280f7dd04dabd0837adba5def8a41d

    • Size

      306KB

    • MD5

      c52b3d7f0e3f4e20727afd090153d14f

    • SHA1

      3d16cf91c34c05e67eb990cc841a5026aa3d409f

    • SHA256

      110a68e6e2da385d1d4c828900c83658d7280f7dd04dabd0837adba5def8a41d

    • SHA512

      6f1a3a6bff0de09a20368bc5a977e043951ec394feb0016f4c8ab2630ffd45a5b9a08078e5c6d0bc3534cd5fb1784743baa24e76c98ca84169c2b34eaa3f8377

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks