General

  • Target

    Solara.exe

  • Size

    310KB

  • Sample

    240927-p81mfswdle

  • MD5

    6955182e32d6996b84f140c7032443df

  • SHA1

    4b0850e389a6f1f51d4c0e9d6c4e9e2b2f92f006

  • SHA256

    ff7db4abfc2600f13a47255db00fd1b450623c41ba30846c57b86b61b4e98c14

  • SHA512

    984171890a252aea437f86a1068de2f3c04a4611ad658d28e7cba57d8bcb5180765c897d25606adcc3217ab722de28be68b5895b0308e892030d2d86bc2394ea

  • SSDEEP

    6144:IWdi58lWsw859s5iANWfUfGr4X3ohglhFexKc6:riClUUaiArfX3oh4x

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Targets

    • Target

      Solara.exe

    • Size

      310KB

    • MD5

      6955182e32d6996b84f140c7032443df

    • SHA1

      4b0850e389a6f1f51d4c0e9d6c4e9e2b2f92f006

    • SHA256

      ff7db4abfc2600f13a47255db00fd1b450623c41ba30846c57b86b61b4e98c14

    • SHA512

      984171890a252aea437f86a1068de2f3c04a4611ad658d28e7cba57d8bcb5180765c897d25606adcc3217ab722de28be68b5895b0308e892030d2d86bc2394ea

    • SSDEEP

      6144:IWdi58lWsw859s5iANWfUfGr4X3ohglhFexKc6:riClUUaiArfX3oh4x

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks