General

  • Target

    babf69c12509b78916b78b8c2da8e4c0N.exe

  • Size

    896KB

  • Sample

    240802-t2dlkawdlh

  • MD5

    babf69c12509b78916b78b8c2da8e4c0

  • SHA1

    a2a207578a697b60fcc27f308369f68cf63ff7a2

  • SHA256

    8537f02cc46c05cfea39a7920c6f40f0298fa92ec3338e025edb43c59010ad70

  • SHA512

    186dd05610acceea0817be6c770f376d553bbd7a0b437e0e5536b4afc6e0ad3ebb5a7b765f4044ed3ad30f42805607b0875b57a59c82ed2131e1d45683656722

  • SSDEEP

    24576:KwqZ/xSjbuxymLA6NTTNTob8bsYdcA21d:lOBxn3pTJWY2A2X

Malware Config

Extracted

Family

redline

Botnet

linkedin721

C2

88.99.151.68:7200

Targets

    • Target

      babf69c12509b78916b78b8c2da8e4c0N.exe

    • Size

      896KB

    • MD5

      babf69c12509b78916b78b8c2da8e4c0

    • SHA1

      a2a207578a697b60fcc27f308369f68cf63ff7a2

    • SHA256

      8537f02cc46c05cfea39a7920c6f40f0298fa92ec3338e025edb43c59010ad70

    • SHA512

      186dd05610acceea0817be6c770f376d553bbd7a0b437e0e5536b4afc6e0ad3ebb5a7b765f4044ed3ad30f42805607b0875b57a59c82ed2131e1d45683656722

    • SSDEEP

      24576:KwqZ/xSjbuxymLA6NTTNTob8bsYdcA21d:lOBxn3pTJWY2A2X

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks