General

  • Target

    a8c1c8f015b17efaa454a30f94634177.bin

  • Size

    976KB

  • Sample

    240624-drrsfazalp

  • MD5

    32aab8a27156369f2876068b0080b388

  • SHA1

    2fe7b9ebe90b5899459fb0a3c34706aa81a4803d

  • SHA256

    dacc9d9d0b7280b3c5fad7f9884689996f5dc00d2701c8f2af5d0558b0d41982

  • SHA512

    d16b093f686cc16a28a31ca948503063a5ea94d6a9829f44d75d23f1fa75112792af4971893c210967cef5dda45cc8e1db9ca5f03d70f9e89a8aae07940004c9

  • SSDEEP

    24576:AqIrV37h2S/I4mm8qLmkG4RLt+qcpghqjcnnRszX1JSxB7zU1bvAm:sbDmmx6kJRhPO6p/MbvAm

Malware Config

Extracted

Family

redline

Botnet

@DolphinLoader_Bot

C2

157.90.5.250:18637

Targets

    • Target

      383734f46f2f29f9111af90cdf9dc3b3e6ea2e23e238a235f46fe487db8cada6.exe

    • Size

      1.0MB

    • MD5

      a8c1c8f015b17efaa454a30f94634177

    • SHA1

      416bacd4cbf6e717ff02d06f92be0586dec5f5fe

    • SHA256

      383734f46f2f29f9111af90cdf9dc3b3e6ea2e23e238a235f46fe487db8cada6

    • SHA512

      6a456e2d7f7d84c4dc21bed1f49312140ce01e99dbb922c26366784fb1a24ae43febad099ecd75858641e71b33dc50360315de074f1906a4a94e0ef51b18e4db

    • SSDEEP

      24576:2JYqTardgOFZz+7N/fcyFGUuCNgvmY4ul8GGQwtDtH4+i+CTjoIBsZTOT:EPqbz+7BfcypgeKl5GHDYBtBsROT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks