General

  • Target

    930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff

  • Size

    267KB

  • Sample

    240509-c1vp1sdg4v

  • MD5

    1d3c789eafd1104c4658a1764c762ed6

  • SHA1

    87d1f05c9a8bfc6eafaa33456f9584ae281539fc

  • SHA256

    930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff

  • SHA512

    91b0c3233058334ee67aca000e40e954746982e921ed6e7ada8ecfb64135978a84703389206381f97069ae7dcc09cc029ffadebc653c94615a87ccf2ce0a0be4

  • SSDEEP

    6144:QROllhS4qdxjPxUUsMk6qhI+ulYm85i1D2KD8MmmKU:6U/SNRY6gI+uGr5isKDBKU

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

https://pastebin.com/raw/NgsUAPya

Targets

    • Target

      930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff

    • Size

      267KB

    • MD5

      1d3c789eafd1104c4658a1764c762ed6

    • SHA1

      87d1f05c9a8bfc6eafaa33456f9584ae281539fc

    • SHA256

      930a2699e5f9424a96074d9abf4ae116f168a73d3d15d4f859487d41c2ad9eff

    • SHA512

      91b0c3233058334ee67aca000e40e954746982e921ed6e7ada8ecfb64135978a84703389206381f97069ae7dcc09cc029ffadebc653c94615a87ccf2ce0a0be4

    • SSDEEP

      6144:QROllhS4qdxjPxUUsMk6qhI+ulYm85i1D2KD8MmmKU:6U/SNRY6gI+uGr5isKDBKU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks