General

  • Target

    694b4d7814f0999985affdd65e758b22923ffbb760902555068e5fd15cc93258

  • Size

    362KB

  • Sample

    220925-kz22psfchl

  • MD5

    cd7a0eb0a3e0ac29784f1adc976800de

  • SHA1

    dabff63b4d461e50ce9306d1451c56cc268df119

  • SHA256

    694b4d7814f0999985affdd65e758b22923ffbb760902555068e5fd15cc93258

  • SHA512

    63c8b935e23b951247baeba6294589fa08c70b542ab3edc0c395d9b5c4b232b696ae812d6071389d474835ed40866a81a40ee04b4d0d47dc226e7a97276c310f

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      694b4d7814f0999985affdd65e758b22923ffbb760902555068e5fd15cc93258

    • Size

      362KB

    • MD5

      cd7a0eb0a3e0ac29784f1adc976800de

    • SHA1

      dabff63b4d461e50ce9306d1451c56cc268df119

    • SHA256

      694b4d7814f0999985affdd65e758b22923ffbb760902555068e5fd15cc93258

    • SHA512

      63c8b935e23b951247baeba6294589fa08c70b542ab3edc0c395d9b5c4b232b696ae812d6071389d474835ed40866a81a40ee04b4d0d47dc226e7a97276c310f

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks