General

  • Target

    ea999995e409b85a8cd7c7b686e84ff8a04fa6383f90c3fab531fe445af710cf

  • Size

    362KB

  • Sample

    220925-qlayysgabl

  • MD5

    8e0fdcd41d3eca85621a50be5b5a9b68

  • SHA1

    3694379118f9c0ea651d612abe4096a92b722e52

  • SHA256

    ea999995e409b85a8cd7c7b686e84ff8a04fa6383f90c3fab531fe445af710cf

  • SHA512

    8cf9a0454da2a5a0e582694ad1e7acd18b87a0160f3c0ce1756d8fb8472b0ff8c3c91e58dc575025136d735db4e871c0ee253d1714e30a8dfc7f31baa54a458a

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      ea999995e409b85a8cd7c7b686e84ff8a04fa6383f90c3fab531fe445af710cf

    • Size

      362KB

    • MD5

      8e0fdcd41d3eca85621a50be5b5a9b68

    • SHA1

      3694379118f9c0ea651d612abe4096a92b722e52

    • SHA256

      ea999995e409b85a8cd7c7b686e84ff8a04fa6383f90c3fab531fe445af710cf

    • SHA512

      8cf9a0454da2a5a0e582694ad1e7acd18b87a0160f3c0ce1756d8fb8472b0ff8c3c91e58dc575025136d735db4e871c0ee253d1714e30a8dfc7f31baa54a458a

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks