General

  • Target

    ff85930eaa20c6a521b785a7e5920b8298f3a2fe89e9a77f05a5766219970667

  • Size

    361KB

  • Sample

    220925-d3tfeaedbp

  • MD5

    b1ff40b9f2d229181fd08ba0b1115b08

  • SHA1

    34e1edcdf88d9d01aad42dad85a1ba2f1344191d

  • SHA256

    ff85930eaa20c6a521b785a7e5920b8298f3a2fe89e9a77f05a5766219970667

  • SHA512

    b22d6569fe5d48ad91c023b5e7c83e7a29de9fd880b1c7e4dda9f3b083ea322ca7007fb0b943577e0d1866aeadee561173944e5b26ed0bb7987eee6e15ae1853

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      ff85930eaa20c6a521b785a7e5920b8298f3a2fe89e9a77f05a5766219970667

    • Size

      361KB

    • MD5

      b1ff40b9f2d229181fd08ba0b1115b08

    • SHA1

      34e1edcdf88d9d01aad42dad85a1ba2f1344191d

    • SHA256

      ff85930eaa20c6a521b785a7e5920b8298f3a2fe89e9a77f05a5766219970667

    • SHA512

      b22d6569fe5d48ad91c023b5e7c83e7a29de9fd880b1c7e4dda9f3b083ea322ca7007fb0b943577e0d1866aeadee561173944e5b26ed0bb7987eee6e15ae1853

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks