General

  • Target

    e4c862704e31ffc35b3ef7855625cdcc3e01ab941fb695060f5e07fce3294b39

  • Size

    361KB

  • Sample

    220925-c5pdsschc8

  • MD5

    3d10c464d2156e622d4024ac77bfdeb0

  • SHA1

    1c9ee507195fab3372f01e081e978a609f4f13de

  • SHA256

    e4c862704e31ffc35b3ef7855625cdcc3e01ab941fb695060f5e07fce3294b39

  • SHA512

    fc4b42ab6ee153f7ff5323e5f2fdc7a6bfb4a2962cb2d4de9fee8afe4b522ff3e488f5e47f016a835d734ffd6502e5add8782b4ca30b9c6cdd598fe8e83ff99d

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      e4c862704e31ffc35b3ef7855625cdcc3e01ab941fb695060f5e07fce3294b39

    • Size

      361KB

    • MD5

      3d10c464d2156e622d4024ac77bfdeb0

    • SHA1

      1c9ee507195fab3372f01e081e978a609f4f13de

    • SHA256

      e4c862704e31ffc35b3ef7855625cdcc3e01ab941fb695060f5e07fce3294b39

    • SHA512

      fc4b42ab6ee153f7ff5323e5f2fdc7a6bfb4a2962cb2d4de9fee8afe4b522ff3e488f5e47f016a835d734ffd6502e5add8782b4ca30b9c6cdd598fe8e83ff99d

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks