General

  • Target

    1d879da8cfed6f490197f6801b982ad2015dc62671db055edc7b576f3d80d43c

  • Size

    364KB

  • Sample

    220926-m5sfkaaee9

  • MD5

    98d2add3d4d0ddff6c74e61067af9410

  • SHA1

    482f03d65e07c82e3dabf665ea749d78c905f835

  • SHA256

    1d879da8cfed6f490197f6801b982ad2015dc62671db055edc7b576f3d80d43c

  • SHA512

    b65cf06b8e9eea6b697fa2414898a120ccf6c4d3a5b573f4e95c86ad31e7ca2aa06d310d60bfdf86f5f403635a96de8682cb059167f6fc4317ce378a9a5f72f3

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      1d879da8cfed6f490197f6801b982ad2015dc62671db055edc7b576f3d80d43c

    • Size

      364KB

    • MD5

      98d2add3d4d0ddff6c74e61067af9410

    • SHA1

      482f03d65e07c82e3dabf665ea749d78c905f835

    • SHA256

      1d879da8cfed6f490197f6801b982ad2015dc62671db055edc7b576f3d80d43c

    • SHA512

      b65cf06b8e9eea6b697fa2414898a120ccf6c4d3a5b573f4e95c86ad31e7ca2aa06d310d60bfdf86f5f403635a96de8682cb059167f6fc4317ce378a9a5f72f3

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks