General

  • Target

    ed3c9fe439906e0b2d870d7bbcd159075dedfde5569adc11419830b35dbfa3ef

  • Size

    392KB

  • Sample

    220908-l2p1laecc9

  • MD5

    2c21d18531fde2240997a841550e219d

  • SHA1

    8e178e96c572c7cf8507183fa145b625463b2102

  • SHA256

    ed3c9fe439906e0b2d870d7bbcd159075dedfde5569adc11419830b35dbfa3ef

  • SHA512

    96491a828cc02480d299808803a078c3988b55ebc594f0278bae0d777d47fead4eac5898d0bde188a27e7290649835770fb551383b1f719a9d5920032da2b095

  • SSDEEP

    12288:x2DjQo7c/q4vM+xRvLg8QyH126W+kcB6dUt:YQogBvM2M56W46dUt

Malware Config

Extracted

Family

redline

Botnet

twick

C2

trustedwicky.com:80

Attributes
  • auth_value

    2284521981f16053dae08194ef371cb3

Targets

    • Target

      ed3c9fe439906e0b2d870d7bbcd159075dedfde5569adc11419830b35dbfa3ef

    • Size

      392KB

    • MD5

      2c21d18531fde2240997a841550e219d

    • SHA1

      8e178e96c572c7cf8507183fa145b625463b2102

    • SHA256

      ed3c9fe439906e0b2d870d7bbcd159075dedfde5569adc11419830b35dbfa3ef

    • SHA512

      96491a828cc02480d299808803a078c3988b55ebc594f0278bae0d777d47fead4eac5898d0bde188a27e7290649835770fb551383b1f719a9d5920032da2b095

    • SSDEEP

      12288:x2DjQo7c/q4vM+xRvLg8QyH126W+kcB6dUt:YQogBvM2M56W46dUt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks