General

  • Target

    f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351

  • Size

    309KB

  • Sample

    220907-f1sgfabba8

  • MD5

    a87e8d6fbdfb50309958555dbd50ed6d

  • SHA1

    4f79763a2c6e40cec5bae55176274691b3c31dc9

  • SHA256

    f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351

  • SHA512

    190a53b670427f778b27de197de327e1f7bb99458f2f73e3b5f8111ff2de9677202ea09c6ae32102c4b43fec6c32b271bbdb6a78f33b644419dd9c4fe9a3708c

  • SSDEEP

    6144:mjFyGCxDDlxd71dlDoSKbv0DakweuWRsDDZH:mjtC9DdlD9KT0wrWRYl

Malware Config

Extracted

Family

redline

Botnet

twick

C2

trustedwicky.com:80

Attributes
  • auth_value

    2284521981f16053dae08194ef371cb3

Targets

    • Target

      f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351

    • Size

      309KB

    • MD5

      a87e8d6fbdfb50309958555dbd50ed6d

    • SHA1

      4f79763a2c6e40cec5bae55176274691b3c31dc9

    • SHA256

      f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351

    • SHA512

      190a53b670427f778b27de197de327e1f7bb99458f2f73e3b5f8111ff2de9677202ea09c6ae32102c4b43fec6c32b271bbdb6a78f33b644419dd9c4fe9a3708c

    • SSDEEP

      6144:mjFyGCxDDlxd71dlDoSKbv0DakweuWRsDDZH:mjtC9DdlD9KT0wrWRYl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks