General

  • Target

    93df0b57a7b26db17a67bef815648d2d219a9b344157cc4cb118ebff2bf5c46c

  • Size

    361KB

  • Sample

    220925-fw1x1sddd5

  • MD5

    04988622ac5c3cbf964a087f817b1e9a

  • SHA1

    5ed68575661d53d1de11081d04f00939f5cb0330

  • SHA256

    93df0b57a7b26db17a67bef815648d2d219a9b344157cc4cb118ebff2bf5c46c

  • SHA512

    8cf1d82cc78871c1dcc031e1d73b421e63b2dfce2d11b35c4b210c7b304affb85d2d3b7f397a9eff7ebe876bcbb6eb1596c242ae0078b2f701682a188a81fea8

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      93df0b57a7b26db17a67bef815648d2d219a9b344157cc4cb118ebff2bf5c46c

    • Size

      361KB

    • MD5

      04988622ac5c3cbf964a087f817b1e9a

    • SHA1

      5ed68575661d53d1de11081d04f00939f5cb0330

    • SHA256

      93df0b57a7b26db17a67bef815648d2d219a9b344157cc4cb118ebff2bf5c46c

    • SHA512

      8cf1d82cc78871c1dcc031e1d73b421e63b2dfce2d11b35c4b210c7b304affb85d2d3b7f397a9eff7ebe876bcbb6eb1596c242ae0078b2f701682a188a81fea8

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks