General

  • Target

    0387f65527e75e3d3c6bb639c2829d814f718a02d7e4ed72d1d52ddfa9f68124

  • Size

    364KB

  • Sample

    220926-g4a71ahga6

  • MD5

    27a51604815dbe0cba6976f9f8c9103a

  • SHA1

    b015869ab43bfe0f2813f7ee129f817a4d634086

  • SHA256

    0387f65527e75e3d3c6bb639c2829d814f718a02d7e4ed72d1d52ddfa9f68124

  • SHA512

    fececeddf87b597bca32f262859ae13a05b8b5c4ea8936fdf18ee6b32eae25336c792ab7f245ec661d2f9b2cbc719e1d58f91e4ddc1500afd4d9fe5bcb1be708

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      0387f65527e75e3d3c6bb639c2829d814f718a02d7e4ed72d1d52ddfa9f68124

    • Size

      364KB

    • MD5

      27a51604815dbe0cba6976f9f8c9103a

    • SHA1

      b015869ab43bfe0f2813f7ee129f817a4d634086

    • SHA256

      0387f65527e75e3d3c6bb639c2829d814f718a02d7e4ed72d1d52ddfa9f68124

    • SHA512

      fececeddf87b597bca32f262859ae13a05b8b5c4ea8936fdf18ee6b32eae25336c792ab7f245ec661d2f9b2cbc719e1d58f91e4ddc1500afd4d9fe5bcb1be708

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks