General

  • Target

    05e2c0da5fc5df710cfbd7cae371c18656bcbb15fd695d7d2b6e492a18d56ecd

  • Size

    362KB

  • Sample

    220925-twt2csgehj

  • MD5

    6aae2911ac131dab22d07efbe0bcf59a

  • SHA1

    269c8e881de07ccb4c3acaee5edd5c69ad29bddf

  • SHA256

    05e2c0da5fc5df710cfbd7cae371c18656bcbb15fd695d7d2b6e492a18d56ecd

  • SHA512

    f278d0411dd76c4ba9d47f0e292a6208df07739548077996b71807aed694ecda916cc458005aa650577c3aa157d37ae05955f0cbdea878bf20ab751665858c51

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      05e2c0da5fc5df710cfbd7cae371c18656bcbb15fd695d7d2b6e492a18d56ecd

    • Size

      362KB

    • MD5

      6aae2911ac131dab22d07efbe0bcf59a

    • SHA1

      269c8e881de07ccb4c3acaee5edd5c69ad29bddf

    • SHA256

      05e2c0da5fc5df710cfbd7cae371c18656bcbb15fd695d7d2b6e492a18d56ecd

    • SHA512

      f278d0411dd76c4ba9d47f0e292a6208df07739548077996b71807aed694ecda916cc458005aa650577c3aa157d37ae05955f0cbdea878bf20ab751665858c51

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks