General

  • Target

    623470fb2254962a5c3fb9741934c6f8400fd527b44f934f6e48f610cc09e2ae

  • Size

    361KB

  • Sample

    220925-c6zadsecbl

  • MD5

    6af566f2ac0213b4ed5779e7affba0f0

  • SHA1

    f9e26028b21d47a346ed60f27ec8c2f89f3a2cd3

  • SHA256

    623470fb2254962a5c3fb9741934c6f8400fd527b44f934f6e48f610cc09e2ae

  • SHA512

    24af60125e10ae77adfafaeed24dc3aa304f9d92d8279046ac847d0c5fa68acaf72ed78c9e476c2931df68a421ee5b11f803326e1530aa3be7305a70600ede5e

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      623470fb2254962a5c3fb9741934c6f8400fd527b44f934f6e48f610cc09e2ae

    • Size

      361KB

    • MD5

      6af566f2ac0213b4ed5779e7affba0f0

    • SHA1

      f9e26028b21d47a346ed60f27ec8c2f89f3a2cd3

    • SHA256

      623470fb2254962a5c3fb9741934c6f8400fd527b44f934f6e48f610cc09e2ae

    • SHA512

      24af60125e10ae77adfafaeed24dc3aa304f9d92d8279046ac847d0c5fa68acaf72ed78c9e476c2931df68a421ee5b11f803326e1530aa3be7305a70600ede5e

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks