General

  • Target

    3ba451a995958cc9cb7cbff6f4ab1deffd5f442a92d4348a448f5d710409d507

  • Size

    362KB

  • Sample

    220925-w9tc4afgc3

  • MD5

    ade8c1c1fd4c8a56c989192efae84c7b

  • SHA1

    6b55a72e97e0c69ec2e91699c8ff8d3ff7d90f5c

  • SHA256

    3ba451a995958cc9cb7cbff6f4ab1deffd5f442a92d4348a448f5d710409d507

  • SHA512

    cace436ce3e745bbfdd2c7fc899fac9b52963ae325e523fbe6ec10e6e42e68195eadc1ba4a8be861f48d9fe03bc55db4e8e268284d9c2a81f45326abdd941b02

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      3ba451a995958cc9cb7cbff6f4ab1deffd5f442a92d4348a448f5d710409d507

    • Size

      362KB

    • MD5

      ade8c1c1fd4c8a56c989192efae84c7b

    • SHA1

      6b55a72e97e0c69ec2e91699c8ff8d3ff7d90f5c

    • SHA256

      3ba451a995958cc9cb7cbff6f4ab1deffd5f442a92d4348a448f5d710409d507

    • SHA512

      cace436ce3e745bbfdd2c7fc899fac9b52963ae325e523fbe6ec10e6e42e68195eadc1ba4a8be861f48d9fe03bc55db4e8e268284d9c2a81f45326abdd941b02

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks