General

  • Target

    5627e89e617110eb8bbe9a74956efc4be131868ee3e0038513a053a288227a06

  • Size

    361KB

  • Sample

    220925-e2417aeedm

  • MD5

    b5a6da6e56d6f4a4534d4e770b64b625

  • SHA1

    1d8589d0b4d9ae9793f9596d1f52e1023390a7cd

  • SHA256

    5627e89e617110eb8bbe9a74956efc4be131868ee3e0038513a053a288227a06

  • SHA512

    15d727871ff8fcf1f064d2dc9f8e10ea9a9ca12349b49f88c99444599a5106079a8529b527651189d708aef28fa33350af2db0245f5466c2d6f44fd971d8c33c

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      5627e89e617110eb8bbe9a74956efc4be131868ee3e0038513a053a288227a06

    • Size

      361KB

    • MD5

      b5a6da6e56d6f4a4534d4e770b64b625

    • SHA1

      1d8589d0b4d9ae9793f9596d1f52e1023390a7cd

    • SHA256

      5627e89e617110eb8bbe9a74956efc4be131868ee3e0038513a053a288227a06

    • SHA512

      15d727871ff8fcf1f064d2dc9f8e10ea9a9ca12349b49f88c99444599a5106079a8529b527651189d708aef28fa33350af2db0245f5466c2d6f44fd971d8c33c

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks