General

  • Target

    f0aaf1b673a9316c4b899ccc4e12d33e.exe

  • Size

    300KB

  • Sample

    241211-wb98yssphw

  • MD5

    f0aaf1b673a9316c4b899ccc4e12d33e

  • SHA1

    294b9c038264d052b3c1c6c80e8f1b109590cf36

  • SHA256

    fcc616ecbe31fadf9c30a9baedde66d2ce7ff10c369979fe9c4f8c5f1bff3fc2

  • SHA512

    97d149658e9e7a576dfb095d5f6d8956cb185d35f07dd8e769b3b957f92260b5de727eb2685522923d15cd70c16c596aa6354452ac851b985ab44407734b6f21

  • SSDEEP

    3072:GcZqf7D34kp/0+mAYkygYdQ0ghnB1fA0PuTVAtkxzF3R4eqiOL2bBOA:GcZqf7DIcnGapB1fA0GTV8krYL

Malware Config

Extracted

Family

redline

Botnet

fvcxcx

C2

185.81.68.147:1912

Targets

    • Target

      f0aaf1b673a9316c4b899ccc4e12d33e.exe

    • Size

      300KB

    • MD5

      f0aaf1b673a9316c4b899ccc4e12d33e

    • SHA1

      294b9c038264d052b3c1c6c80e8f1b109590cf36

    • SHA256

      fcc616ecbe31fadf9c30a9baedde66d2ce7ff10c369979fe9c4f8c5f1bff3fc2

    • SHA512

      97d149658e9e7a576dfb095d5f6d8956cb185d35f07dd8e769b3b957f92260b5de727eb2685522923d15cd70c16c596aa6354452ac851b985ab44407734b6f21

    • SSDEEP

      3072:GcZqf7D34kp/0+mAYkygYdQ0ghnB1fA0PuTVAtkxzF3R4eqiOL2bBOA:GcZqf7DIcnGapB1fA0GTV8krYL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks