General

  • Target

    ae5f93be97532181d2909574b38da3a796fa3786151af8ef854c0aeaa88c1b38

  • Size

    361KB

  • Sample

    220925-hb3l8adfb4

  • MD5

    0bd18cb5ffdba67b1589cef07f66f877

  • SHA1

    71f08256a0b7786872b5658fb168add454c672d1

  • SHA256

    ae5f93be97532181d2909574b38da3a796fa3786151af8ef854c0aeaa88c1b38

  • SHA512

    43a80bf68b7a5be607b3d5b4471aeaa5794c274e16e393874937a4afa486bc391b5937075b8f8dd19926023e5c9c0aab5338f03b4761092c1f50d0f598f293a5

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      ae5f93be97532181d2909574b38da3a796fa3786151af8ef854c0aeaa88c1b38

    • Size

      361KB

    • MD5

      0bd18cb5ffdba67b1589cef07f66f877

    • SHA1

      71f08256a0b7786872b5658fb168add454c672d1

    • SHA256

      ae5f93be97532181d2909574b38da3a796fa3786151af8ef854c0aeaa88c1b38

    • SHA512

      43a80bf68b7a5be607b3d5b4471aeaa5794c274e16e393874937a4afa486bc391b5937075b8f8dd19926023e5c9c0aab5338f03b4761092c1f50d0f598f293a5

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks