General

  • Target

    6e9b826a82a5d00184599175e914127b94a2e09687650754b452606c45977565

  • Size

    363KB

  • Sample

    220925-yhxybafhf7

  • MD5

    dc0ae21e68b56de426aa5d62139e7d53

  • SHA1

    30e29e95fb8f69bbf0761d1154119b64ef082804

  • SHA256

    6e9b826a82a5d00184599175e914127b94a2e09687650754b452606c45977565

  • SHA512

    8893c54c269ca403511b84299084a43337ea8283dafa03ceb5659645e9e7744b76d0feb527bea6923eb145746cc633de1f1ccab11f96376745e52aaf58567847

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      6e9b826a82a5d00184599175e914127b94a2e09687650754b452606c45977565

    • Size

      363KB

    • MD5

      dc0ae21e68b56de426aa5d62139e7d53

    • SHA1

      30e29e95fb8f69bbf0761d1154119b64ef082804

    • SHA256

      6e9b826a82a5d00184599175e914127b94a2e09687650754b452606c45977565

    • SHA512

      8893c54c269ca403511b84299084a43337ea8283dafa03ceb5659645e9e7744b76d0feb527bea6923eb145746cc633de1f1ccab11f96376745e52aaf58567847

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks