General

  • Target

    781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95

  • Size

    118KB

  • Sample

    240507-ca6dtsgb57

  • MD5

    3f3a989bd22532dfc6d733b0fae7ba51

  • SHA1

    219c676f44fa2bf085e797080d7a0b68984b20e3

  • SHA256

    781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95

  • SHA512

    143950aea3b2f447fc65ab2ad57bad83fbfaf9608721ea67bc5f10a171c96ab9e8330ea0a534c16a4bea4884759f8a1a95cd090dd7e30b12fec6700c1f9f4ede

  • SSDEEP

    1536:v6mcgrfQlGkiWXJ+dJtN3MjSEX+bsDf3Ok3i5QB5weq5Lk9fq+6yf6HZyW:6l9iQJ+dx3MjTlPy5QBU5AFq+6c6HZT

Malware Config

Extracted

Family

redline

Botnet

708370717

C2

https://pastebin.com/raw/KE5Mft0T

Targets

    • Target

      781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95

    • Size

      118KB

    • MD5

      3f3a989bd22532dfc6d733b0fae7ba51

    • SHA1

      219c676f44fa2bf085e797080d7a0b68984b20e3

    • SHA256

      781f7f1dc655adda8558c2dc45edb6a5c60038b7d812883c27b79b03c59c6f95

    • SHA512

      143950aea3b2f447fc65ab2ad57bad83fbfaf9608721ea67bc5f10a171c96ab9e8330ea0a534c16a4bea4884759f8a1a95cd090dd7e30b12fec6700c1f9f4ede

    • SSDEEP

      1536:v6mcgrfQlGkiWXJ+dJtN3MjSEX+bsDf3Ok3i5QB5weq5Lk9fq+6yf6HZyW:6l9iQJ+dx3MjTlPy5QBU5AFq+6c6HZT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks