General

  • Target

    3a587e284489c0f8be8d1ea87f507d6dd6da8992e14590cfb25c513ec7007606

  • Size

    360KB

  • Sample

    220924-zpaxsscaa8

  • MD5

    3484cf1ab61564ade7b0c112525a1e72

  • SHA1

    d2747fe4c1cb2ad2057404cf883a71d883db7c34

  • SHA256

    3a587e284489c0f8be8d1ea87f507d6dd6da8992e14590cfb25c513ec7007606

  • SHA512

    16aad70658631c4f0b549e7238f1796ae8aff0f0754fe2a93d998b90e7db8c3282acd9844b05408427298bf8338e9d10b630e753333e875e6e91e08c34646ea9

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      3a587e284489c0f8be8d1ea87f507d6dd6da8992e14590cfb25c513ec7007606

    • Size

      360KB

    • MD5

      3484cf1ab61564ade7b0c112525a1e72

    • SHA1

      d2747fe4c1cb2ad2057404cf883a71d883db7c34

    • SHA256

      3a587e284489c0f8be8d1ea87f507d6dd6da8992e14590cfb25c513ec7007606

    • SHA512

      16aad70658631c4f0b549e7238f1796ae8aff0f0754fe2a93d998b90e7db8c3282acd9844b05408427298bf8338e9d10b630e753333e875e6e91e08c34646ea9

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks