General

  • Target

    8d161a71b545edf7f3331532d1642cabfdfe78a13d8248977af244369bc52738

  • Size

    267KB

  • Sample

    240509-dd4j3she39

  • MD5

    ca7c72e075034fd3b3edae94e29736d8

  • SHA1

    98505ad8e9e605a35abf010e37556ec7aec60395

  • SHA256

    8d161a71b545edf7f3331532d1642cabfdfe78a13d8248977af244369bc52738

  • SHA512

    a55b92905f13c42c16576367490a1f4eeb8a31af311270430793464d0c889afcfe8aef16297713f5d06af6480ec7dd3882a9b4d6cd23aa18b446c0544b7456a3

  • SSDEEP

    6144:MW9EWzOQed1/zlIoJ8o8L37k3tFhponfghGDmKU:t9BzOxho4HpuIbKU

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

https://pastebin.com/raw/NgsUAPya

Targets

    • Target

      8d161a71b545edf7f3331532d1642cabfdfe78a13d8248977af244369bc52738

    • Size

      267KB

    • MD5

      ca7c72e075034fd3b3edae94e29736d8

    • SHA1

      98505ad8e9e605a35abf010e37556ec7aec60395

    • SHA256

      8d161a71b545edf7f3331532d1642cabfdfe78a13d8248977af244369bc52738

    • SHA512

      a55b92905f13c42c16576367490a1f4eeb8a31af311270430793464d0c889afcfe8aef16297713f5d06af6480ec7dd3882a9b4d6cd23aa18b446c0544b7456a3

    • SSDEEP

      6144:MW9EWzOQed1/zlIoJ8o8L37k3tFhponfghGDmKU:t9BzOxho4HpuIbKU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks