General

  • Target

    45317f547b942444826dc09a4b30f8cfae654276a163a4d62f64437c8c90fe05

  • Size

    363KB

  • Sample

    220925-ymz88shbcl

  • MD5

    27e6b9f303c9f92bb6ee292766256970

  • SHA1

    44b031d7b1ca846965a3698a0b510e2c04bb753c

  • SHA256

    45317f547b942444826dc09a4b30f8cfae654276a163a4d62f64437c8c90fe05

  • SHA512

    c710e9c69bc4e10607ec88ab894a18face8b5efb018fc95125d8f52c776874e93cc395c101f9c2536cc5a99db1a2cc64b984b3d3e0b623a55a30f75903361515

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      45317f547b942444826dc09a4b30f8cfae654276a163a4d62f64437c8c90fe05

    • Size

      363KB

    • MD5

      27e6b9f303c9f92bb6ee292766256970

    • SHA1

      44b031d7b1ca846965a3698a0b510e2c04bb753c

    • SHA256

      45317f547b942444826dc09a4b30f8cfae654276a163a4d62f64437c8c90fe05

    • SHA512

      c710e9c69bc4e10607ec88ab894a18face8b5efb018fc95125d8f52c776874e93cc395c101f9c2536cc5a99db1a2cc64b984b3d3e0b623a55a30f75903361515

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks