General

  • Target

    277b552d67002a2c8a3a8bc5633ad1d12fc018fbe6587b88d20c0b2c38a50665

  • Size

    361KB

  • Sample

    220925-g37vksdef8

  • MD5

    68eb94cf434b6cb3d0fae3b01a5a8020

  • SHA1

    7f5e6cae01a89c32a2a5e3ad3d24576a67e89cbd

  • SHA256

    277b552d67002a2c8a3a8bc5633ad1d12fc018fbe6587b88d20c0b2c38a50665

  • SHA512

    24de3fa1fafc84afcc9495df1d73323545d2b69f70124a1307a08c3ab2abeb08cbcbcaecf8e448b5f231d61baeeddc90ba6996797dea2bfb66c8c78ee3afe2a3

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      277b552d67002a2c8a3a8bc5633ad1d12fc018fbe6587b88d20c0b2c38a50665

    • Size

      361KB

    • MD5

      68eb94cf434b6cb3d0fae3b01a5a8020

    • SHA1

      7f5e6cae01a89c32a2a5e3ad3d24576a67e89cbd

    • SHA256

      277b552d67002a2c8a3a8bc5633ad1d12fc018fbe6587b88d20c0b2c38a50665

    • SHA512

      24de3fa1fafc84afcc9495df1d73323545d2b69f70124a1307a08c3ab2abeb08cbcbcaecf8e448b5f231d61baeeddc90ba6996797dea2bfb66c8c78ee3afe2a3

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks