General

  • Target

    17d0afe51a2dc01f9594733ea18fa979942d2537a1bcfdab64473b0eaafc34a4

  • Size

    363KB

  • Sample

    220926-ahvwyshghq

  • MD5

    64420719fb33847b7ee4aa47db03e304

  • SHA1

    f63a0887d5f919546bba896576f49893b56c8a39

  • SHA256

    17d0afe51a2dc01f9594733ea18fa979942d2537a1bcfdab64473b0eaafc34a4

  • SHA512

    a3befc1c3d149a03d2e619f30e8c6dab3dd8f51efe580e2cb3a1484799084bbddcfacc04d053f3b3056b3dee55f3b9d23975f57192b415cf34e09aec98d6e037

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      17d0afe51a2dc01f9594733ea18fa979942d2537a1bcfdab64473b0eaafc34a4

    • Size

      363KB

    • MD5

      64420719fb33847b7ee4aa47db03e304

    • SHA1

      f63a0887d5f919546bba896576f49893b56c8a39

    • SHA256

      17d0afe51a2dc01f9594733ea18fa979942d2537a1bcfdab64473b0eaafc34a4

    • SHA512

      a3befc1c3d149a03d2e619f30e8c6dab3dd8f51efe580e2cb3a1484799084bbddcfacc04d053f3b3056b3dee55f3b9d23975f57192b415cf34e09aec98d6e037

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks