General

  • Target

    5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a.exe

  • Size

    313KB

  • Sample

    240906-bpkj8sybjm

  • MD5

    324d2a434b8a3e038661a75587e303b8

  • SHA1

    21e1be17da8e401a5928f5cdf5c262cefb305910

  • SHA256

    5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a

  • SHA512

    eaf7d0393a62b2187614b3234a280d938ac2cbb9659117b39b2d482c909dea207b685ff7be46b4045468628958a03aa460f9dbc71b1566f54f2f252c934fd374

  • SSDEEP

    6144:xJcrjyufnjS1Ht3pHjDNItvNoCOD6iuh52HK7q1BU0H:HUuufjSVbJnn650K21

Malware Config

Extracted

Family

redline

Botnet

@PORETYNOJEM

C2

185.215.113.22:80

Targets

    • Target

      5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a.exe

    • Size

      313KB

    • MD5

      324d2a434b8a3e038661a75587e303b8

    • SHA1

      21e1be17da8e401a5928f5cdf5c262cefb305910

    • SHA256

      5d06ec15c9349e9ae13d477fdab3d1a50b9bf784a726aff3a48dbcd5f99e493a

    • SHA512

      eaf7d0393a62b2187614b3234a280d938ac2cbb9659117b39b2d482c909dea207b685ff7be46b4045468628958a03aa460f9dbc71b1566f54f2f252c934fd374

    • SSDEEP

      6144:xJcrjyufnjS1Ht3pHjDNItvNoCOD6iuh52HK7q1BU0H:HUuufjSVbJnn650K21

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks