General

  • Target

    79fc20c78e45d10f5f6d3f12c736b8d5.bin

  • Size

    115KB

  • Sample

    240426-brndxagh82

  • MD5

    8c4f01e967294763449ff933c15e69c5

  • SHA1

    f0f74e03f84d2918e743ce9caa4dd37efa5ecdee

  • SHA256

    b2d1c723c55fc639610904c51c72df5df8a0e4a8d717cdcae7c0d5dfe55df27b

  • SHA512

    4939450478346f6795143a4035a1118bd744e79a78f51bab48dcae2ad6dfbe5eae2962e0007f24bcba15d31e68d14ce2eea6502d122ca24e0495cbbfe4bdc528

  • SSDEEP

    3072:Jtyt3gdnWQTKpyxfKR3JWox5aMZxyr2cVlqYs31XCwum6h:JU3qdCzkARzYM1F6h

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      5e0a9b8f7175b983c012fa530bb29693cd8aadf2b2feb0f56d1c089fac20edb4.exe

    • Size

      305KB

    • MD5

      79fc20c78e45d10f5f6d3f12c736b8d5

    • SHA1

      4a6b50e0cc1aa3c98bcb786311421ebf6815dcd0

    • SHA256

      5e0a9b8f7175b983c012fa530bb29693cd8aadf2b2feb0f56d1c089fac20edb4

    • SHA512

      8c86d2c46d5eac37eaf7ca2612a395a52811e12a4d1653e410ccfc609cf64ff25b0ec10c469f96467745ec553a2abf1a5d4259ac347d2e92083453ea64143b4d

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks