General

  • Target

    f2dfe587e05427000fa7633b7d33a8c95a5ab9e1abe54ab4f67dead149dbdcf2

  • Size

    310KB

  • Sample

    240822-xt7q8awapl

  • MD5

    34428685a2a334123fa86fc13d900736

  • SHA1

    ddb63114d8f282df451b4ed06b2324da0fdef9a5

  • SHA256

    f2dfe587e05427000fa7633b7d33a8c95a5ab9e1abe54ab4f67dead149dbdcf2

  • SHA512

    53984b518c16758e8235ee37543abff3bf8ba0c6dfbc3cdef28f57487775e8671227cb5825406f45f1c5d578e4ae4dd6c56d1abbe3792492c048bd5daa229b7f

  • SSDEEP

    6144:fmQl5L6ZeKh6r5H3+pEWuXdrcSmH2XH55rMDp79PjgG4dDpZ18Jmjz:+QlZHqEWu9tMtVjcDpDWmjz

Malware Config

Extracted

Family

redline

Botnet

@exelzt

C2

185.215.113.22:80

Targets

    • Target

      Ехternаl 2.4.exe

    • Size

      313KB

    • MD5

      2225ba07e4bed2fdd12f2d29d1c1a72c

    • SHA1

      29c610f92adb7dbbb497a3fa48f4c887a3484372

    • SHA256

      182d7b64bd5299fa03ab74d4ed79c56c31fdc2f48d98b70f8efa438026d97710

    • SHA512

      ff2b05ed63b8456a68c269e51e7a605dd7c4b204b1417fbfc511aa10adc56d1b1b1234d71a87d7d753d41e1cd7312c0dc9cf3c3713aa21ff61e843c0e1559242

    • SSDEEP

      6144:hrH/AO8NeKh6P5H3spEWuXdfcSmH2X/55rADj79Pjg84dDpZ1nE:hrH/AOb/oEWuFBAPVjEDpDE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks