General

  • Target

    e0f2b2303fd1c9e71cee34f2df8f8011.bin

  • Size

    115KB

  • Sample

    240426-cafheahb21

  • MD5

    92d145e2b813a8a0290d25d22e2d7175

  • SHA1

    bd8fd2a8b5ce4efc9015cc583c4720df36c76b9b

  • SHA256

    66ec119da1c7de064ba6b2b44fcba79aea3ffa993f4ece6cb7204a8a6234fa9f

  • SHA512

    5157573a35b43050d3477f1e57c25b9dd98051980633fb91a568f910692cf0cb70fe30873db4b004bf2146a63d6dff62a7bf4f7d901b4e760cfed4f8a5ec34c1

  • SSDEEP

    3072:1zH9YTAprSP8XBbGXrXmDIgqe0CkPteg8wscAClWU:1zHusNjXEXrXBVNPMg8l+lj

Malware Config

Extracted

Family

redline

Botnet

spoo

C2

103.113.70.99:2630

Targets

    • Target

      d7603ee9b4ae922bee366a81374ad3234851c93f78a22023cc612dc0e148b816.exe

    • Size

      305KB

    • MD5

      e0f2b2303fd1c9e71cee34f2df8f8011

    • SHA1

      be89a535c4d9c5d417556cab1537b82050cf6078

    • SHA256

      d7603ee9b4ae922bee366a81374ad3234851c93f78a22023cc612dc0e148b816

    • SHA512

      c863e0534715e135e074606ccdbbbb8be91290837ea0d72d3b54dbf27edc72f5f1b64d454850e633dec47d121aa0949ab810df64dd01dba57243fad2573fb5e3

    • SSDEEP

      6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks