General

  • Target

    de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3

  • Size

    369KB

  • Sample

    220913-gm3kxsaeeq

  • MD5

    5dc7782817c3278f30317e703e61ade8

  • SHA1

    be19390b4afcb9166d17ca674ad2ed0f2669ab23

  • SHA256

    de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3

  • SHA512

    22aedf0a69f807bf41b10ae5307998dfb5245128f91a1c27d05f8f1d10357df295e42da3822bd43841bf533ee1d119f38bf242aea0ace1fb0c1d24a9a6a401f8

  • SSDEEP

    6144:IXEZPSLM1h2M8l/86ohioYooKn5mZNeiUt1bdyzk+rIHm/WX3xid:I2PV1h2JV86ohioYk5mZNeioZ1OMyWnx

Malware Config

Extracted

Family

redline

Botnet

twick

C2

trustedwicky.com:80

Attributes
  • auth_value

    2284521981f16053dae08194ef371cb3

Targets

    • Target

      de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3

    • Size

      369KB

    • MD5

      5dc7782817c3278f30317e703e61ade8

    • SHA1

      be19390b4afcb9166d17ca674ad2ed0f2669ab23

    • SHA256

      de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3

    • SHA512

      22aedf0a69f807bf41b10ae5307998dfb5245128f91a1c27d05f8f1d10357df295e42da3822bd43841bf533ee1d119f38bf242aea0ace1fb0c1d24a9a6a401f8

    • SSDEEP

      6144:IXEZPSLM1h2M8l/86ohioYooKn5mZNeiUt1bdyzk+rIHm/WX3xid:I2PV1h2JV86ohioYk5mZNeioZ1OMyWnx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks