General

  • Target

    f60cf29d2a7b57b16e1d5f00ab8730fd0daffc79b99836296cd0ffdc00970713

  • Size

    361KB

  • Sample

    220925-g3mjmsehal

  • MD5

    ad73d9b239c27090683ae04aa549b6a8

  • SHA1

    f10cacc26312dfd01303c4798b3d24efc510caf8

  • SHA256

    f60cf29d2a7b57b16e1d5f00ab8730fd0daffc79b99836296cd0ffdc00970713

  • SHA512

    5fbd9d5fc9d330f9fc0f356e2e38a946c3ba99e9ce67a84f234965baa80cfc66c3816287f1025d90c52c124739b632d5a538ef79cdf8c738c8b536186656e7ca

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      f60cf29d2a7b57b16e1d5f00ab8730fd0daffc79b99836296cd0ffdc00970713

    • Size

      361KB

    • MD5

      ad73d9b239c27090683ae04aa549b6a8

    • SHA1

      f10cacc26312dfd01303c4798b3d24efc510caf8

    • SHA256

      f60cf29d2a7b57b16e1d5f00ab8730fd0daffc79b99836296cd0ffdc00970713

    • SHA512

      5fbd9d5fc9d330f9fc0f356e2e38a946c3ba99e9ce67a84f234965baa80cfc66c3816287f1025d90c52c124739b632d5a538ef79cdf8c738c8b536186656e7ca

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks