General

  • Target

    99447a1ce87e77b5f65d34e3d4e956ee45ab372123e410e94ab52b89cdc3c6a9

  • Size

    362KB

  • Sample

    220925-vpyxeafec5

  • MD5

    106c98e4e1e4014a6cae95121af356e8

  • SHA1

    d06559bc58d22a0bb74a62b1f8101ba1030e9adc

  • SHA256

    99447a1ce87e77b5f65d34e3d4e956ee45ab372123e410e94ab52b89cdc3c6a9

  • SHA512

    f48d5cbb2641266a4076e550184bad2202716e5bbe2d3977dd365585f58cbe48578ddfa65d85c4da555109587dca907fa51eb915ef3211586c4a9f7756c118bb

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      99447a1ce87e77b5f65d34e3d4e956ee45ab372123e410e94ab52b89cdc3c6a9

    • Size

      362KB

    • MD5

      106c98e4e1e4014a6cae95121af356e8

    • SHA1

      d06559bc58d22a0bb74a62b1f8101ba1030e9adc

    • SHA256

      99447a1ce87e77b5f65d34e3d4e956ee45ab372123e410e94ab52b89cdc3c6a9

    • SHA512

      f48d5cbb2641266a4076e550184bad2202716e5bbe2d3977dd365585f58cbe48578ddfa65d85c4da555109587dca907fa51eb915ef3211586c4a9f7756c118bb

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks