General

  • Target

    b670c5f20f03a89b99bc83eaa0b3068ea0e8b9369355656e4cc18ac2144da5e4

  • Size

    362KB

  • Sample

    220925-lb1peafdap

  • MD5

    ec3285bca885544bdfbc3ac11295b685

  • SHA1

    6f8c358438434d5b49d91b71a3da81f5e568e8de

  • SHA256

    b670c5f20f03a89b99bc83eaa0b3068ea0e8b9369355656e4cc18ac2144da5e4

  • SHA512

    3794024dc635019bd652fc7277a555efc82a25b8fefc023e83e28d16f2ed90492d569e03fecf3b31eb5ee833536815bbaba4c622efd6389516a77c0536cabeaa

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      b670c5f20f03a89b99bc83eaa0b3068ea0e8b9369355656e4cc18ac2144da5e4

    • Size

      362KB

    • MD5

      ec3285bca885544bdfbc3ac11295b685

    • SHA1

      6f8c358438434d5b49d91b71a3da81f5e568e8de

    • SHA256

      b670c5f20f03a89b99bc83eaa0b3068ea0e8b9369355656e4cc18ac2144da5e4

    • SHA512

      3794024dc635019bd652fc7277a555efc82a25b8fefc023e83e28d16f2ed90492d569e03fecf3b31eb5ee833536815bbaba4c622efd6389516a77c0536cabeaa

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks