General

  • Target

    3b3d0be622293b9a66595aebf4466ceab22156a9bdc642a08444dac02ac5a8ed.exe

  • Size

    300KB

  • Sample

    240912-bwjaratgra

  • MD5

    16578a3626fb9d163c54a1ee42b70359

  • SHA1

    eba5cc82c8ee6d4719873f8b1b7af36856035c63

  • SHA256

    3b3d0be622293b9a66595aebf4466ceab22156a9bdc642a08444dac02ac5a8ed

  • SHA512

    32f712b27812735bec4a544c71e6361ac15cc71e456e385543eacfa599f48947281d1b128cc8423a637f60f18e9d65dbf3372d3362413a5b00ce89be831d8fed

  • SSDEEP

    3072:ScZqf7D34kp/0+mAqky4EKQQgB+B1fA0PuTVAtkxzu3RkeqiOL2bBOA:ScZqf7DIcnUJMB1fA0GTV8kEML

Malware Config

Extracted

Family

redline

Botnet

1

C2

78.70.235.238:1912

Targets

    • Target

      3b3d0be622293b9a66595aebf4466ceab22156a9bdc642a08444dac02ac5a8ed.exe

    • Size

      300KB

    • MD5

      16578a3626fb9d163c54a1ee42b70359

    • SHA1

      eba5cc82c8ee6d4719873f8b1b7af36856035c63

    • SHA256

      3b3d0be622293b9a66595aebf4466ceab22156a9bdc642a08444dac02ac5a8ed

    • SHA512

      32f712b27812735bec4a544c71e6361ac15cc71e456e385543eacfa599f48947281d1b128cc8423a637f60f18e9d65dbf3372d3362413a5b00ce89be831d8fed

    • SSDEEP

      3072:ScZqf7D34kp/0+mAqky4EKQQgB+B1fA0PuTVAtkxzu3RkeqiOL2bBOA:ScZqf7DIcnUJMB1fA0GTV8kEML

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks