General

  • Target

    bb41f36d21022332ced7c5cc918ae9f06b3359130bdfd0e9a95257cfc01f898f

  • Size

    361KB

  • Sample

    220925-enhwssedhp

  • MD5

    22200a69e1bcaabb23ef58d1aca6a279

  • SHA1

    f54cdb33136b1a5d3907facd528c109e7046428b

  • SHA256

    bb41f36d21022332ced7c5cc918ae9f06b3359130bdfd0e9a95257cfc01f898f

  • SHA512

    5a71d71f609b2a0555b7688f98bc6255ef3ec70e236960dbabdd0ae7de7395efd211b84db9328c4ce6739030fc78c35dc2c0e5928d817221cfe8c56b4deb2ef2

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      bb41f36d21022332ced7c5cc918ae9f06b3359130bdfd0e9a95257cfc01f898f

    • Size

      361KB

    • MD5

      22200a69e1bcaabb23ef58d1aca6a279

    • SHA1

      f54cdb33136b1a5d3907facd528c109e7046428b

    • SHA256

      bb41f36d21022332ced7c5cc918ae9f06b3359130bdfd0e9a95257cfc01f898f

    • SHA512

      5a71d71f609b2a0555b7688f98bc6255ef3ec70e236960dbabdd0ae7de7395efd211b84db9328c4ce6739030fc78c35dc2c0e5928d817221cfe8c56b4deb2ef2

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks