General

  • Target

    187efee50376fe42a72a9d80c87ffa4e83d751db9c07daa06621b91e7ba3351d

  • Size

    363KB

  • Sample

    220926-f6cyyaheh4

  • MD5

    d1a1014702e6a1d3fcdf2ad4401fca05

  • SHA1

    5cc05540c4345a74a852d1e22b5426497dec4670

  • SHA256

    187efee50376fe42a72a9d80c87ffa4e83d751db9c07daa06621b91e7ba3351d

  • SHA512

    cd30935d87b2b235cd109ca69a45ce704591b6ab51ebfc825195ca6acc6921b501dfaf976e9e1befa68de7ec5a8abbfb55094aa15b676743f9f1cb298ca67096

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      187efee50376fe42a72a9d80c87ffa4e83d751db9c07daa06621b91e7ba3351d

    • Size

      363KB

    • MD5

      d1a1014702e6a1d3fcdf2ad4401fca05

    • SHA1

      5cc05540c4345a74a852d1e22b5426497dec4670

    • SHA256

      187efee50376fe42a72a9d80c87ffa4e83d751db9c07daa06621b91e7ba3351d

    • SHA512

      cd30935d87b2b235cd109ca69a45ce704591b6ab51ebfc825195ca6acc6921b501dfaf976e9e1befa68de7ec5a8abbfb55094aa15b676743f9f1cb298ca67096

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks