General

  • Target

    fc43d0927efd9cf578faa81ecef0474dcdbc59008008a9f996d5405a57850a9f

  • Size

    360KB

  • Sample

    220923-smbb8ahch8

  • MD5

    b3ce0ac08d2d6defc8d3e24fb1468360

  • SHA1

    74d308137493f8885385a3fefec7da7433f41088

  • SHA256

    fc43d0927efd9cf578faa81ecef0474dcdbc59008008a9f996d5405a57850a9f

  • SHA512

    6947c5ebb7d28c4f28c4a83c1d41666efd69c091ae9edc9f45b9b9d01619985240c8aedaf58cfb88750a3af2b0673f1b470b08f6cb09a4b460fc1cbd7238e982

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      fc43d0927efd9cf578faa81ecef0474dcdbc59008008a9f996d5405a57850a9f

    • Size

      360KB

    • MD5

      b3ce0ac08d2d6defc8d3e24fb1468360

    • SHA1

      74d308137493f8885385a3fefec7da7433f41088

    • SHA256

      fc43d0927efd9cf578faa81ecef0474dcdbc59008008a9f996d5405a57850a9f

    • SHA512

      6947c5ebb7d28c4f28c4a83c1d41666efd69c091ae9edc9f45b9b9d01619985240c8aedaf58cfb88750a3af2b0673f1b470b08f6cb09a4b460fc1cbd7238e982

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks