General

  • Target

    0d31df1863f97a604a39b08f95e2f3b9

  • Size

    371KB

  • Sample

    241109-px4vqsvclg

  • MD5

    0d31df1863f97a604a39b08f95e2f3b9

  • SHA1

    0952c5b3bb51208a7fc2945ce912d08b4436088e

  • SHA256

    4929409c92d72721b3bee5b399b0f88a547c56f95a6369e0901cee26a83f3a03

  • SHA512

    2f0caf799b541c6dd055fabfb7fb9be03c25f868bf19a2f10397baac202f086e1149837f336f18a69293232aeaea0d5c64e269a6570c1843cc0463c513dbdcb7

  • SSDEEP

    6144:FObzf8f+L0O/7rxgj5IveLe6SE8Bvx090JTs7Gi4aMC7QGS3s2uMAedtN5iou:b2Yugj5IeNSE8Bu+Op4RC23Z9AkN5iN

Malware Config

Extracted

Family

redline

Botnet

world10

C2

jamesmillion.xyz:15772

Attributes
  • auth_value

    a74a2e49cd85c6f93cb4e7fc8691721c

Targets

    • Target

      f78477275d79d0eead0b62d3355df9be273518c54eeac3719a97823365cee858

    • Size

      488KB

    • MD5

      4c596d32f75e3a84e48c36e8fc8025fd

    • SHA1

      6a03c9d53e10c752b66b677e528fbcd1a70a6d0c

    • SHA256

      f78477275d79d0eead0b62d3355df9be273518c54eeac3719a97823365cee858

    • SHA512

      0b159fe0b1766c27c89f65069fb3d33a59b3fc3efd7519629497df3ec07eda1b938819a2b0faa6cf2c305a736c3c93d409d42901c744644e11867a06bd7796c2

    • SSDEEP

      6144:k9Cq6V1jfMRWYYIveLu6SE8jvx09SJTs7ci4aMC7WGS3swOco36deigavwVfe5K0:fV1DopYIe1SE8juQOf4RCw3dJTxuuB

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks