General

  • Target

    6896fc6ca4826a3dcd8c73cd3769fbf9e29a765fe6df1fd8386d98f805fb2238

  • Size

    361KB

  • Sample

    220925-eetlyaeden

  • MD5

    20d3d2e4549f8556b7adc1281313c716

  • SHA1

    e897f436e94317ad645fffea403752ec297d0d21

  • SHA256

    6896fc6ca4826a3dcd8c73cd3769fbf9e29a765fe6df1fd8386d98f805fb2238

  • SHA512

    e9afc1aa8ecdf45ab091b727c774a2d0963d2d893f659e0394c534b54aa36531df4dca70a08681abaf8c7a355b35f2c0531fef8e84b864253d41f74ec744adbc

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      6896fc6ca4826a3dcd8c73cd3769fbf9e29a765fe6df1fd8386d98f805fb2238

    • Size

      361KB

    • MD5

      20d3d2e4549f8556b7adc1281313c716

    • SHA1

      e897f436e94317ad645fffea403752ec297d0d21

    • SHA256

      6896fc6ca4826a3dcd8c73cd3769fbf9e29a765fe6df1fd8386d98f805fb2238

    • SHA512

      e9afc1aa8ecdf45ab091b727c774a2d0963d2d893f659e0394c534b54aa36531df4dca70a08681abaf8c7a355b35f2c0531fef8e84b864253d41f74ec744adbc

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks