General

  • Target

    6558653c2b49628ae784f8a5e2f8b1efd3a5b7048ec033b9e087f1a3f2f2d13a

  • Size

    306KB

  • Sample

    240424-sk786scb7z

  • MD5

    43d8f1a95c5289bd132736fb4b2ebcd6

  • SHA1

    9b04fe3ebf97defd65e5fb170cb8754acaa547d1

  • SHA256

    6558653c2b49628ae784f8a5e2f8b1efd3a5b7048ec033b9e087f1a3f2f2d13a

  • SHA512

    6db20f0e13dd28853eccbd4fea6dc4795a7517c40a36160f4b09384c57eed01cfc5d6a4a99e111a98de4ac8b88a713cb5cfdb17820d4b03558ef7d0659c09993

  • SSDEEP

    6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      6558653c2b49628ae784f8a5e2f8b1efd3a5b7048ec033b9e087f1a3f2f2d13a

    • Size

      306KB

    • MD5

      43d8f1a95c5289bd132736fb4b2ebcd6

    • SHA1

      9b04fe3ebf97defd65e5fb170cb8754acaa547d1

    • SHA256

      6558653c2b49628ae784f8a5e2f8b1efd3a5b7048ec033b9e087f1a3f2f2d13a

    • SHA512

      6db20f0e13dd28853eccbd4fea6dc4795a7517c40a36160f4b09384c57eed01cfc5d6a4a99e111a98de4ac8b88a713cb5cfdb17820d4b03558ef7d0659c09993

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks