General

  • Target

    959b369cee7545d5c801ec44a2cfd5d5d98657b12d2c63f98abccff64d679312

  • Size

    361KB

  • Sample

    220925-ffk7madch5

  • MD5

    9b7d866e7d537921409d6dc9052915e3

  • SHA1

    20e8740fe3503e946b611d570bb69572dec15b2c

  • SHA256

    959b369cee7545d5c801ec44a2cfd5d5d98657b12d2c63f98abccff64d679312

  • SHA512

    c048d9cbe7b5cea10f2b5a3b463a0f69b8e0fbf7b879b1c9ae2e9ba8afb1fae0988b2cca807f98acb0d167707679468a43a97f6e0f9463ced412dc9129a2bbbf

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      959b369cee7545d5c801ec44a2cfd5d5d98657b12d2c63f98abccff64d679312

    • Size

      361KB

    • MD5

      9b7d866e7d537921409d6dc9052915e3

    • SHA1

      20e8740fe3503e946b611d570bb69572dec15b2c

    • SHA256

      959b369cee7545d5c801ec44a2cfd5d5d98657b12d2c63f98abccff64d679312

    • SHA512

      c048d9cbe7b5cea10f2b5a3b463a0f69b8e0fbf7b879b1c9ae2e9ba8afb1fae0988b2cca807f98acb0d167707679468a43a97f6e0f9463ced412dc9129a2bbbf

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks