General

  • Target

    862f560eedeb50aea489b649e1c3790254a1d8424cc2bafde2c68e3dcd161967

  • Size

    857KB

  • Sample

    241212-pcckratlhw

  • MD5

    77a55f762651be8698f5a33937e1e44f

  • SHA1

    4e1af4b0448b1fea39f5601654bd28c00bc29d83

  • SHA256

    862f560eedeb50aea489b649e1c3790254a1d8424cc2bafde2c68e3dcd161967

  • SHA512

    1f745e255872fd1bc468edf901e38fc441922c0827021f31ef17ca5825547be3a8ac6fc57edef0a8e64919d34aba96096f93cc822db1c89d28863fedc06e55f1

  • SSDEEP

    24576:jjlIhSPd+pOMFQQ9d6hIvhFlnY5ADSUmCfRq2dlgYSk1mS57elu:jjl+SPspAqdFvhztDHdfFr51ql

Malware Config

Extracted

Family

redline

Botnet

LOGS

C2

87.120.120.86:1912

Targets

    • Target

      862f560eedeb50aea489b649e1c3790254a1d8424cc2bafde2c68e3dcd161967

    • Size

      857KB

    • MD5

      77a55f762651be8698f5a33937e1e44f

    • SHA1

      4e1af4b0448b1fea39f5601654bd28c00bc29d83

    • SHA256

      862f560eedeb50aea489b649e1c3790254a1d8424cc2bafde2c68e3dcd161967

    • SHA512

      1f745e255872fd1bc468edf901e38fc441922c0827021f31ef17ca5825547be3a8ac6fc57edef0a8e64919d34aba96096f93cc822db1c89d28863fedc06e55f1

    • SSDEEP

      24576:jjlIhSPd+pOMFQQ9d6hIvhFlnY5ADSUmCfRq2dlgYSk1mS57elu:jjl+SPspAqdFvhztDHdfFr51ql

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks