General

  • Target

    2ea05b5b9847fb2e777f4433a2f73cba12b96a8b074ab83179cbafbc49963665.exe

  • Size

    305KB

  • Sample

    241218-cr1jxaylc1

  • MD5

    bfae2c479a12cbc660e580a84d3e3ce0

  • SHA1

    0891b36b510049ef811deb93fcdacfdfdbfc406a

  • SHA256

    2ea05b5b9847fb2e777f4433a2f73cba12b96a8b074ab83179cbafbc49963665

  • SHA512

    ce53e1e95eee76f0f49e29b91ce27c35c972980ebd8e3ea2da387af40c667cae457288e183447e0513ed1c9ec0c4de5af6f81daddd77c533c437ee8496d59085

  • SSDEEP

    6144:RJRGyoPwcMZAwSYQ1rL4OgbDetMfhiRdsLoOJ0tYRVlOPAKePNO4:dGyoPwcMZhnQ1rL4OKDeohi3sLo7WY4

Malware Config

Extracted

Family

redline

Botnet

eewx

C2

185.81.68.147:1912

Targets

    • Target

      2ea05b5b9847fb2e777f4433a2f73cba12b96a8b074ab83179cbafbc49963665.exe

    • Size

      305KB

    • MD5

      bfae2c479a12cbc660e580a84d3e3ce0

    • SHA1

      0891b36b510049ef811deb93fcdacfdfdbfc406a

    • SHA256

      2ea05b5b9847fb2e777f4433a2f73cba12b96a8b074ab83179cbafbc49963665

    • SHA512

      ce53e1e95eee76f0f49e29b91ce27c35c972980ebd8e3ea2da387af40c667cae457288e183447e0513ed1c9ec0c4de5af6f81daddd77c533c437ee8496d59085

    • SSDEEP

      6144:RJRGyoPwcMZAwSYQ1rL4OgbDetMfhiRdsLoOJ0tYRVlOPAKePNO4:dGyoPwcMZhnQ1rL4OKDeohi3sLo7WY4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks