General

  • Target

    843d8af7832a53bb58aa14aa7cbae45f45989a0cd04833f5a2e86fa1cc62e463

  • Size

    361KB

  • Sample

    220925-gqctnsdec7

  • MD5

    dd2375875a2bbada9045f7df87f9b626

  • SHA1

    cd1c1352b40e943b7b9f4a4c9355951e29219fc8

  • SHA256

    843d8af7832a53bb58aa14aa7cbae45f45989a0cd04833f5a2e86fa1cc62e463

  • SHA512

    2364d4af7f292d16ff6f2c3628f6874ec67f5e5a929a392545829c55166ec3245ff67a753cbed146d8512e89bb0c49367d5740d4b86d679b6213d5952d72f5f8

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      843d8af7832a53bb58aa14aa7cbae45f45989a0cd04833f5a2e86fa1cc62e463

    • Size

      361KB

    • MD5

      dd2375875a2bbada9045f7df87f9b626

    • SHA1

      cd1c1352b40e943b7b9f4a4c9355951e29219fc8

    • SHA256

      843d8af7832a53bb58aa14aa7cbae45f45989a0cd04833f5a2e86fa1cc62e463

    • SHA512

      2364d4af7f292d16ff6f2c3628f6874ec67f5e5a929a392545829c55166ec3245ff67a753cbed146d8512e89bb0c49367d5740d4b86d679b6213d5952d72f5f8

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks