General

  • Target

    32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82

  • Size

    315KB

  • Sample

    240507-zalezsed2z

  • MD5

    8593635e7692a063e8ffdf017a1b8b7f

  • SHA1

    efcd70922a3d3577e617ff3fe78bbeeca43648e7

  • SHA256

    32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82

  • SHA512

    bd46e1344bb1c577260517fbecd126942b56b7e69c476af8ef6c3f104d96c3e5e1277be974b678af490a957ce6d3bbf7ad0f99911dc3dc68606a4981affe1c16

  • SSDEEP

    6144:mi9pI60nbM8uPZy3+8KIDFquxMFQEjKP1dN9Vm8D5p9PGP0FXHS:/9+60nbnu6qaE7ePrN9D5p9nHS

Malware Config

Extracted

Family

redline

Botnet

708370717

C2

https://pastebin.com/raw/KE5Mft0T

Targets

    • Target

      32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82

    • Size

      315KB

    • MD5

      8593635e7692a063e8ffdf017a1b8b7f

    • SHA1

      efcd70922a3d3577e617ff3fe78bbeeca43648e7

    • SHA256

      32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82

    • SHA512

      bd46e1344bb1c577260517fbecd126942b56b7e69c476af8ef6c3f104d96c3e5e1277be974b678af490a957ce6d3bbf7ad0f99911dc3dc68606a4981affe1c16

    • SSDEEP

      6144:mi9pI60nbM8uPZy3+8KIDFquxMFQEjKP1dN9Vm8D5p9PGP0FXHS:/9+60nbnu6qaE7ePrN9D5p9nHS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks