General

  • Target

    4be839ef16079be8c184fae241e067b607860f60c7cc45f4de438f0ab1ec722e

  • Size

    277KB

  • Sample

    220920-sqs2faded8

  • MD5

    a4be4e5fceb959b7295027c3709e2456

  • SHA1

    65a8d3c6e2e7c0ea4db92cc03708b78903ef59e2

  • SHA256

    4be839ef16079be8c184fae241e067b607860f60c7cc45f4de438f0ab1ec722e

  • SHA512

    c3e6534b331fc6dc0dd1bba1b19bc4ae6d56512fa406392cbfadb6e44f6a6fa478111316d9cf6a2e313a9cd2b85b84342b68efb14de88db73380c22ae528d78e

  • SSDEEP

    3072:oSKUgg55LPC49fksp1LQ2ej41cuKsBzITvVJVl5azxGTqvoOydDa0aAnd4BdtypL:HlCmvp1LQ9PuLITth5Wx6XaDAnCrP

Malware Config

Extracted

Family

redline

Botnet

Test

C2

46.18.107.225:6134

Attributes
  • auth_value

    670d22280e1d18e7a969eb0dd4e2f47c

Targets

    • Target

      4be839ef16079be8c184fae241e067b607860f60c7cc45f4de438f0ab1ec722e

    • Size

      277KB

    • MD5

      a4be4e5fceb959b7295027c3709e2456

    • SHA1

      65a8d3c6e2e7c0ea4db92cc03708b78903ef59e2

    • SHA256

      4be839ef16079be8c184fae241e067b607860f60c7cc45f4de438f0ab1ec722e

    • SHA512

      c3e6534b331fc6dc0dd1bba1b19bc4ae6d56512fa406392cbfadb6e44f6a6fa478111316d9cf6a2e313a9cd2b85b84342b68efb14de88db73380c22ae528d78e

    • SSDEEP

      3072:oSKUgg55LPC49fksp1LQ2ej41cuKsBzITvVJVl5azxGTqvoOydDa0aAnd4BdtypL:HlCmvp1LQ9PuLITth5Wx6XaDAnCrP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks