General

  • Target

    d71d602ade6f987cebacade7917e528ecb7c7990c4962868fd061ecd4a204131

  • Size

    364KB

  • Sample

    220926-gnhxxaaghl

  • MD5

    e1ac1f95b488241e87b561da5363c63e

  • SHA1

    d3442017c3a3e41b8f2ef91426428a9c2c417594

  • SHA256

    d71d602ade6f987cebacade7917e528ecb7c7990c4962868fd061ecd4a204131

  • SHA512

    c0d0ee5f9c2b5fbadb9e5dab62bce89ecae61d246f6e55ca65eb4fe1cf7048ec3cce04f2269d37a19c5ce2aec9aff84bc6626ce772a4a13cececac977dbe9cfb

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      d71d602ade6f987cebacade7917e528ecb7c7990c4962868fd061ecd4a204131

    • Size

      364KB

    • MD5

      e1ac1f95b488241e87b561da5363c63e

    • SHA1

      d3442017c3a3e41b8f2ef91426428a9c2c417594

    • SHA256

      d71d602ade6f987cebacade7917e528ecb7c7990c4962868fd061ecd4a204131

    • SHA512

      c0d0ee5f9c2b5fbadb9e5dab62bce89ecae61d246f6e55ca65eb4fe1cf7048ec3cce04f2269d37a19c5ce2aec9aff84bc6626ce772a4a13cececac977dbe9cfb

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks