General

  • Target

    83e866d9f2fda92b80f40412d4d9d3ded5cf196f108534d2259f84f5b9bbefdb

  • Size

    361KB

  • Sample

    220924-26enescdc3

  • MD5

    546e9a5ebd2180b9c413a816242f398b

  • SHA1

    18b0c327306cd75022c112a529bb878594d17226

  • SHA256

    83e866d9f2fda92b80f40412d4d9d3ded5cf196f108534d2259f84f5b9bbefdb

  • SHA512

    d033a64ee8e9bddada83660f3b23278b04d61ca9915260c6c12106690bff5df533fc57484f17eafe9bdc20c4ebbc8af0777a8c54c43c6bb870b716d758142cbd

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      83e866d9f2fda92b80f40412d4d9d3ded5cf196f108534d2259f84f5b9bbefdb

    • Size

      361KB

    • MD5

      546e9a5ebd2180b9c413a816242f398b

    • SHA1

      18b0c327306cd75022c112a529bb878594d17226

    • SHA256

      83e866d9f2fda92b80f40412d4d9d3ded5cf196f108534d2259f84f5b9bbefdb

    • SHA512

      d033a64ee8e9bddada83660f3b23278b04d61ca9915260c6c12106690bff5df533fc57484f17eafe9bdc20c4ebbc8af0777a8c54c43c6bb870b716d758142cbd

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks