General

  • Target

    328b3fcd7b4d16a1baf8fec70e22e0075be63077b07dae4e3e16ba0db7a38bc1

  • Size

    363KB

  • Sample

    220926-adrczageh9

  • MD5

    c1d3adfc11a29f8d23205e0596b8d037

  • SHA1

    34327aeb1fafe758cc3a1ebba7d87ad5273d6aa1

  • SHA256

    328b3fcd7b4d16a1baf8fec70e22e0075be63077b07dae4e3e16ba0db7a38bc1

  • SHA512

    3a0c57b85f2ede025e9779dbc557d247cea6ee847f5be2ae2ed2e75e5265867af0068396d0dfc520b0a72a49191d05345a34ac95a4b137280c9e6011c80c314a

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      328b3fcd7b4d16a1baf8fec70e22e0075be63077b07dae4e3e16ba0db7a38bc1

    • Size

      363KB

    • MD5

      c1d3adfc11a29f8d23205e0596b8d037

    • SHA1

      34327aeb1fafe758cc3a1ebba7d87ad5273d6aa1

    • SHA256

      328b3fcd7b4d16a1baf8fec70e22e0075be63077b07dae4e3e16ba0db7a38bc1

    • SHA512

      3a0c57b85f2ede025e9779dbc557d247cea6ee847f5be2ae2ed2e75e5265867af0068396d0dfc520b0a72a49191d05345a34ac95a4b137280c9e6011c80c314a

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks