General

  • Target

    c984942e8b3e28e183d8fcb0cbca9d7210c22ea27744719aa2aff541f718aeeb

  • Size

    360KB

  • Sample

    220923-rc5mmshae7

  • MD5

    c7b5351ab4cbad4bc902a18b93f2bb72

  • SHA1

    bbd00adaed12057a9c6c20376601201e00a34c04

  • SHA256

    c984942e8b3e28e183d8fcb0cbca9d7210c22ea27744719aa2aff541f718aeeb

  • SHA512

    86a95718dd71c854d0d6b6f13310e47584e91a5e568a1dbd7b7f62e78dad207f73a65e1711e7257e901534df6f7c833839d9ebddec497009bcea763c3c418cd8

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      c984942e8b3e28e183d8fcb0cbca9d7210c22ea27744719aa2aff541f718aeeb

    • Size

      360KB

    • MD5

      c7b5351ab4cbad4bc902a18b93f2bb72

    • SHA1

      bbd00adaed12057a9c6c20376601201e00a34c04

    • SHA256

      c984942e8b3e28e183d8fcb0cbca9d7210c22ea27744719aa2aff541f718aeeb

    • SHA512

      86a95718dd71c854d0d6b6f13310e47584e91a5e568a1dbd7b7f62e78dad207f73a65e1711e7257e901534df6f7c833839d9ebddec497009bcea763c3c418cd8

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks