General

  • Target

    83e11c7d80a0df1e0ce1c1cb5b9eea3df13d517c6115a8b7e0c05f5039c5b5ab

  • Size

    364KB

  • Sample

    211019-kyej1sfea3

  • MD5

    0f7bad0447bd5a2121473032e1a59b52

  • SHA1

    61e8e0a88434ab755ae09b2226818e8da660e89a

  • SHA256

    83e11c7d80a0df1e0ce1c1cb5b9eea3df13d517c6115a8b7e0c05f5039c5b5ab

  • SHA512

    ddb2294a83e8f5c1899637d429a78f14a3059b1e3774aa1a4c5109ea3b69f2f7ac7222dab5abbb8f17a7e69b879ff1b44de0473f926df700d8b1103d66754b05

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      83e11c7d80a0df1e0ce1c1cb5b9eea3df13d517c6115a8b7e0c05f5039c5b5ab

    • Size

      364KB

    • MD5

      0f7bad0447bd5a2121473032e1a59b52

    • SHA1

      61e8e0a88434ab755ae09b2226818e8da660e89a

    • SHA256

      83e11c7d80a0df1e0ce1c1cb5b9eea3df13d517c6115a8b7e0c05f5039c5b5ab

    • SHA512

      ddb2294a83e8f5c1899637d429a78f14a3059b1e3774aa1a4c5109ea3b69f2f7ac7222dab5abbb8f17a7e69b879ff1b44de0473f926df700d8b1103d66754b05

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks