General

  • Target

    4e669de76e3a3477aed385841a2ff6d8ef59cf71459a9ff1f9b306500966c01a

  • Size

    361KB

  • Sample

    220925-ch532acgd8

  • MD5

    8bf109ef97e1e72b8bc3ec48863d57d6

  • SHA1

    0aaf699e851234f839694c57c639ba60a67008de

  • SHA256

    4e669de76e3a3477aed385841a2ff6d8ef59cf71459a9ff1f9b306500966c01a

  • SHA512

    a80c1fb0518dc6de88dfa8e5eba7f3cdbc0f442f18592b7fe9ddfa092c91668300703b5be4401d4701db0f16d5a7de7910b9b5b27ed0ab32e36643d7d43ad506

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      4e669de76e3a3477aed385841a2ff6d8ef59cf71459a9ff1f9b306500966c01a

    • Size

      361KB

    • MD5

      8bf109ef97e1e72b8bc3ec48863d57d6

    • SHA1

      0aaf699e851234f839694c57c639ba60a67008de

    • SHA256

      4e669de76e3a3477aed385841a2ff6d8ef59cf71459a9ff1f9b306500966c01a

    • SHA512

      a80c1fb0518dc6de88dfa8e5eba7f3cdbc0f442f18592b7fe9ddfa092c91668300703b5be4401d4701db0f16d5a7de7910b9b5b27ed0ab32e36643d7d43ad506

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks