General

  • Target

    a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e

  • Size

    315KB

  • Sample

    240507-yxnm7ade4x

  • MD5

    3df2b69307e1512f14295f2e90f9668d

  • SHA1

    8bfb6b38adbd60b9457033738587fa91a5c59b21

  • SHA256

    a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e

  • SHA512

    6dcd1dde8d2add0b8d97829adb446b1293899dc91d031796ea8acad26fc0b890b68981aec6e4e1c7078a434fcb0b353e687983626372a5d0a2bfc8c428201012

  • SSDEEP

    6144:NV9pI60nbM8uPZy3+8KIDp/uBADtHlAX3DXC2mz+xBYT2EAMKFXHS:f9+60nbnuG/ztFAXtBgAMKlHS

Malware Config

Extracted

Family

redline

Botnet

5345987420

C2

https://pastebin.com/raw/KE5Mft0T

Targets

    • Target

      a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e

    • Size

      315KB

    • MD5

      3df2b69307e1512f14295f2e90f9668d

    • SHA1

      8bfb6b38adbd60b9457033738587fa91a5c59b21

    • SHA256

      a72d49db643b740e89769685bb0dd85223af092429f1836cd95e69fec5f22e0e

    • SHA512

      6dcd1dde8d2add0b8d97829adb446b1293899dc91d031796ea8acad26fc0b890b68981aec6e4e1c7078a434fcb0b353e687983626372a5d0a2bfc8c428201012

    • SSDEEP

      6144:NV9pI60nbM8uPZy3+8KIDp/uBADtHlAX3DXC2mz+xBYT2EAMKFXHS:f9+60nbnuG/ztFAXtBgAMKlHS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks