General

  • Target

    ecf9d4ec4bb7055e8df25830c68fb9da763ec09f2aea6036b1ab380b7bc0e165

  • Size

    364KB

  • Sample

    220926-pt342aagf6

  • MD5

    8b76cf09d26d9571c526ce7d767182a9

  • SHA1

    8081e2620a1e21b389cbc836d5c7a6f2250abd48

  • SHA256

    ecf9d4ec4bb7055e8df25830c68fb9da763ec09f2aea6036b1ab380b7bc0e165

  • SHA512

    95bca615cbff2119fa65ca5b93fb0ea973b68f4bce179e5e4ab15aee650af9d5d874cbb04dd37b65f4e17fd77c1d24e3d8f6bafa634aefc9e47ecc1e6fffc464

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Targets

    • Target

      ecf9d4ec4bb7055e8df25830c68fb9da763ec09f2aea6036b1ab380b7bc0e165

    • Size

      364KB

    • MD5

      8b76cf09d26d9571c526ce7d767182a9

    • SHA1

      8081e2620a1e21b389cbc836d5c7a6f2250abd48

    • SHA256

      ecf9d4ec4bb7055e8df25830c68fb9da763ec09f2aea6036b1ab380b7bc0e165

    • SHA512

      95bca615cbff2119fa65ca5b93fb0ea973b68f4bce179e5e4ab15aee650af9d5d874cbb04dd37b65f4e17fd77c1d24e3d8f6bafa634aefc9e47ecc1e6fffc464

    • SSDEEP

      6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks