General

  • Target

    1a5122337e05773c5517c37d26bae1c9c0c6e3805b775580c9ca9ab6ff304240

  • Size

    362KB

  • Sample

    220925-xw9nlafgh7

  • MD5

    1314b15be53be99f2b66469f4ec7b483

  • SHA1

    54b3992d9231b578dab8ba73c573f80b12e87757

  • SHA256

    1a5122337e05773c5517c37d26bae1c9c0c6e3805b775580c9ca9ab6ff304240

  • SHA512

    8d143af2c9c72a2c1f3ea364bfb4132f367a5f394e18839d112bd2071bcc5eeb3c972a13902a14b181164f6d95122b528d37b9235d10f6c0a5b02515868aaa6a

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      1a5122337e05773c5517c37d26bae1c9c0c6e3805b775580c9ca9ab6ff304240

    • Size

      362KB

    • MD5

      1314b15be53be99f2b66469f4ec7b483

    • SHA1

      54b3992d9231b578dab8ba73c573f80b12e87757

    • SHA256

      1a5122337e05773c5517c37d26bae1c9c0c6e3805b775580c9ca9ab6ff304240

    • SHA512

      8d143af2c9c72a2c1f3ea364bfb4132f367a5f394e18839d112bd2071bcc5eeb3c972a13902a14b181164f6d95122b528d37b9235d10f6c0a5b02515868aaa6a

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks