General

  • Target

    b121da5d4ea405453284cbcf001e750feb3eaf4c3a4cb35d2cd44ecf96f85584

  • Size

    267KB

  • Sample

    240509-b4degabd9s

  • MD5

    badb07000ee512419746fa1055631ac5

  • SHA1

    53b2709a63e49720e3aa8d6ada4140eaa48bdaa2

  • SHA256

    b121da5d4ea405453284cbcf001e750feb3eaf4c3a4cb35d2cd44ecf96f85584

  • SHA512

    30f399df2ece75bfe1a0b418dfcbc1e1010b972fdb20a659bcd0a63bc24123e37d22c2ae3d62baf56fa75267a0d67bfebf6c6dd83e580a5ab01ec615287647b1

  • SSDEEP

    6144:DIOllhS4qdxjPxUUspxkxUEgJGb0r7IAF/mmKU:cU/SNRBYAQr7I8TKU

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

https://pastebin.com/raw/NgsUAPya

Targets

    • Target

      b121da5d4ea405453284cbcf001e750feb3eaf4c3a4cb35d2cd44ecf96f85584

    • Size

      267KB

    • MD5

      badb07000ee512419746fa1055631ac5

    • SHA1

      53b2709a63e49720e3aa8d6ada4140eaa48bdaa2

    • SHA256

      b121da5d4ea405453284cbcf001e750feb3eaf4c3a4cb35d2cd44ecf96f85584

    • SHA512

      30f399df2ece75bfe1a0b418dfcbc1e1010b972fdb20a659bcd0a63bc24123e37d22c2ae3d62baf56fa75267a0d67bfebf6c6dd83e580a5ab01ec615287647b1

    • SSDEEP

      6144:DIOllhS4qdxjPxUUspxkxUEgJGb0r7IAF/mmKU:cU/SNRBYAQr7I8TKU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks