General

  • Target

    cfb2d2becb527eb6016ab52682ff8edeccf2412457b66d450ce68eeff0435242

  • Size

    239KB

  • Sample

    210926-zgs4eafch4

  • MD5

    e4304558c9e50eb91d6c5ce1f15a97d3

  • SHA1

    b7a1325cf6ef06518aa9973f183d80ff497a1fac

  • SHA256

    cfb2d2becb527eb6016ab52682ff8edeccf2412457b66d450ce68eeff0435242

  • SHA512

    d7b8a7561fbb7c2fe876a551843a2cfb21bff564490cb5434f303fd27145ef41e9a3bb57bf5362c5d234af02feffec162a9afd6d805e3dbd14484dba50a993c2

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      cfb2d2becb527eb6016ab52682ff8edeccf2412457b66d450ce68eeff0435242

    • Size

      239KB

    • MD5

      e4304558c9e50eb91d6c5ce1f15a97d3

    • SHA1

      b7a1325cf6ef06518aa9973f183d80ff497a1fac

    • SHA256

      cfb2d2becb527eb6016ab52682ff8edeccf2412457b66d450ce68eeff0435242

    • SHA512

      d7b8a7561fbb7c2fe876a551843a2cfb21bff564490cb5434f303fd27145ef41e9a3bb57bf5362c5d234af02feffec162a9afd6d805e3dbd14484dba50a993c2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks