General

  • Target

    5687e7b2f822d621aaf8a492350373f2b9d40b3cb0925d6e2a2b76b8951b2cea

  • Size

    360KB

  • Sample

    220923-p63c9sabej

  • MD5

    adab840bdf218e71601f78c8028bbf11

  • SHA1

    905147856f8519512338ecf793f572bc7bb15edd

  • SHA256

    5687e7b2f822d621aaf8a492350373f2b9d40b3cb0925d6e2a2b76b8951b2cea

  • SHA512

    e029eacc2fa47e34da5cfa0fb882557ac4479f2aa8a31a40525f75810c6f0574ff0ba37c6b77ca6f2433e97436c4576abbae582f6da3ab694942acfac21e0ace

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      5687e7b2f822d621aaf8a492350373f2b9d40b3cb0925d6e2a2b76b8951b2cea

    • Size

      360KB

    • MD5

      adab840bdf218e71601f78c8028bbf11

    • SHA1

      905147856f8519512338ecf793f572bc7bb15edd

    • SHA256

      5687e7b2f822d621aaf8a492350373f2b9d40b3cb0925d6e2a2b76b8951b2cea

    • SHA512

      e029eacc2fa47e34da5cfa0fb882557ac4479f2aa8a31a40525f75810c6f0574ff0ba37c6b77ca6f2433e97436c4576abbae582f6da3ab694942acfac21e0ace

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks