General

  • Target

    429bbf26c2d242dd21a00a66b38433b6cd22e8ec3e4f1dc3cc16f5e90b6bc925

  • Size

    306KB

  • Sample

    240424-rzwy1sbg4t

  • MD5

    1446c7dfa92983e0c8c44357e083defa

  • SHA1

    d48029aedfccb5471c30275942b1ef27a7c9ebe2

  • SHA256

    429bbf26c2d242dd21a00a66b38433b6cd22e8ec3e4f1dc3cc16f5e90b6bc925

  • SHA512

    ad7b9225606de881fcb829040485e534c4c646925b1cb7f3e7d9f78ee01f32e6024876f5526e733338398355a5536d6f2ed3c5bb12149347b082c92e15db3832

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      429bbf26c2d242dd21a00a66b38433b6cd22e8ec3e4f1dc3cc16f5e90b6bc925

    • Size

      306KB

    • MD5

      1446c7dfa92983e0c8c44357e083defa

    • SHA1

      d48029aedfccb5471c30275942b1ef27a7c9ebe2

    • SHA256

      429bbf26c2d242dd21a00a66b38433b6cd22e8ec3e4f1dc3cc16f5e90b6bc925

    • SHA512

      ad7b9225606de881fcb829040485e534c4c646925b1cb7f3e7d9f78ee01f32e6024876f5526e733338398355a5536d6f2ed3c5bb12149347b082c92e15db3832

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks