General

  • Target

    e65aabd2655f0eb850c033b53558efe7b1af63d0b807834719d7eeada5ae7979

  • Size

    361KB

  • Sample

    220925-e99awadce9

  • MD5

    e558bd7386cd6b28745b0c447a761b46

  • SHA1

    1c2db66253b25668fb21fa28bc5e18555ff203bd

  • SHA256

    e65aabd2655f0eb850c033b53558efe7b1af63d0b807834719d7eeada5ae7979

  • SHA512

    fa00a4f60380d3b360ff128ee19a8353d1415802f0adfde6a4b951d3e8765b0b2a4662d571967e0d2d3fec65f94b547fedcfb8cf4f49f2c10556561e1f4abeb1

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      e65aabd2655f0eb850c033b53558efe7b1af63d0b807834719d7eeada5ae7979

    • Size

      361KB

    • MD5

      e558bd7386cd6b28745b0c447a761b46

    • SHA1

      1c2db66253b25668fb21fa28bc5e18555ff203bd

    • SHA256

      e65aabd2655f0eb850c033b53558efe7b1af63d0b807834719d7eeada5ae7979

    • SHA512

      fa00a4f60380d3b360ff128ee19a8353d1415802f0adfde6a4b951d3e8765b0b2a4662d571967e0d2d3fec65f94b547fedcfb8cf4f49f2c10556561e1f4abeb1

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks