General

  • Target

    25f4451b243d5e5b05eaccf5dd58e3cfcee7969b145d9aad7aff6750ab9a6d0b

  • Size

    301KB

  • Sample

    241213-n17kcsyrfr

  • MD5

    ff1e7643a5c9294bd8e8fd743b323c8f

  • SHA1

    b35c6e9090b44c2db2220c5c42c0f68210ba73a9

  • SHA256

    25f4451b243d5e5b05eaccf5dd58e3cfcee7969b145d9aad7aff6750ab9a6d0b

  • SHA512

    62b1f41dcab0f4330d761cdbfc4e99e15830b4cdcc44e7788fd15f57f5043eb53e626e009c397dcce13841e192165c4584cee0f57c0e5bd5b876f507d051b675

  • SSDEEP

    6144:b2JEWGoxDtDYL5s/oAg5+Z4vDWcEGpQTMz9J0tYRVmOEe3M5X64:NWGoxDt0LCgArZ4vHEGpQTMz72K4

Malware Config

Extracted

Family

redline

Botnet

fvcxcx

C2

185.81.68.147:1912

Targets

    • Target

      25f4451b243d5e5b05eaccf5dd58e3cfcee7969b145d9aad7aff6750ab9a6d0b

    • Size

      301KB

    • MD5

      ff1e7643a5c9294bd8e8fd743b323c8f

    • SHA1

      b35c6e9090b44c2db2220c5c42c0f68210ba73a9

    • SHA256

      25f4451b243d5e5b05eaccf5dd58e3cfcee7969b145d9aad7aff6750ab9a6d0b

    • SHA512

      62b1f41dcab0f4330d761cdbfc4e99e15830b4cdcc44e7788fd15f57f5043eb53e626e009c397dcce13841e192165c4584cee0f57c0e5bd5b876f507d051b675

    • SSDEEP

      6144:b2JEWGoxDtDYL5s/oAg5+Z4vDWcEGpQTMz9J0tYRVmOEe3M5X64:NWGoxDt0LCgArZ4vHEGpQTMz72K4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks