General

  • Target

    33d22706acd830239f68d51b36f0c03dadb74e9763943e9c9f39077c8a3654b6

  • Size

    361KB

  • Sample

    220925-gdb2lsegbp

  • MD5

    527d9baa20b12cc1c0f0776f6f49e9a0

  • SHA1

    34b6c3ee0d3031314fe1ebc7a05f553ef674f07e

  • SHA256

    33d22706acd830239f68d51b36f0c03dadb74e9763943e9c9f39077c8a3654b6

  • SHA512

    75904b9555829eb07bbbbd520ef5a528f4d3ee50c3a8bfbcc4edde5dd1094e31edeffd5264d7fa53fc2d37d4d35e90670f4b6a7e137cd4963a548c28542b129a

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      33d22706acd830239f68d51b36f0c03dadb74e9763943e9c9f39077c8a3654b6

    • Size

      361KB

    • MD5

      527d9baa20b12cc1c0f0776f6f49e9a0

    • SHA1

      34b6c3ee0d3031314fe1ebc7a05f553ef674f07e

    • SHA256

      33d22706acd830239f68d51b36f0c03dadb74e9763943e9c9f39077c8a3654b6

    • SHA512

      75904b9555829eb07bbbbd520ef5a528f4d3ee50c3a8bfbcc4edde5dd1094e31edeffd5264d7fa53fc2d37d4d35e90670f4b6a7e137cd4963a548c28542b129a

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks