General

  • Target

    2352b8a48db974c1d41047faf23208771fcb40eb33448995226e7745600f175b

  • Size

    364KB

  • Sample

    220926-gpcsaahfe3

  • MD5

    5e9e1efde6df4fc52e49f61e0ef36f83

  • SHA1

    9b5cf0f30ba25662ee95698b428e6a8fded533da

  • SHA256

    2352b8a48db974c1d41047faf23208771fcb40eb33448995226e7745600f175b

  • SHA512

    11f376d5efcff33e436054433bfa40fb213c87659c4fa512f7ba66d082bcec2b2c6350dbfe084707bed372e8164691aad5083d8b3eb8a220864e6e6f7cd0a3c5

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      2352b8a48db974c1d41047faf23208771fcb40eb33448995226e7745600f175b

    • Size

      364KB

    • MD5

      5e9e1efde6df4fc52e49f61e0ef36f83

    • SHA1

      9b5cf0f30ba25662ee95698b428e6a8fded533da

    • SHA256

      2352b8a48db974c1d41047faf23208771fcb40eb33448995226e7745600f175b

    • SHA512

      11f376d5efcff33e436054433bfa40fb213c87659c4fa512f7ba66d082bcec2b2c6350dbfe084707bed372e8164691aad5083d8b3eb8a220864e6e6f7cd0a3c5

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks