General

  • Target

    e8f1a6a1771f9d2a6eea8042d6283c78524e59801bbee0c7574341ee68dbdacd

  • Size

    464KB

  • Sample

    220928-181g8shbg6

  • MD5

    68781ba2480e24d7676a6d6ec36ac5a2

  • SHA1

    94ab12152255b1a8ef1556fbf25a5b1a414a6029

  • SHA256

    e8f1a6a1771f9d2a6eea8042d6283c78524e59801bbee0c7574341ee68dbdacd

  • SHA512

    e6e4fc0994ed6b455407eab7c8f068438a5fe4aacc942c5fe3a1f4251730f4c034091e7a1f89833db7e31a30bc704722155331a7bd35b82c194965ecdf10daba

  • SSDEEP

    12288:UHyw6lzVRKzgBg/pgy8mY8uxTE2ifaRUMJfcC:AizV1qx+82iiRUs

Malware Config

Extracted

Family

redline

Botnet

1.3

C2

152.89.218.219:45790

Attributes
  • auth_value

    afe24321e9017179e86b28b662fd7ea0

Targets

    • Target

      e8f1a6a1771f9d2a6eea8042d6283c78524e59801bbee0c7574341ee68dbdacd

    • Size

      464KB

    • MD5

      68781ba2480e24d7676a6d6ec36ac5a2

    • SHA1

      94ab12152255b1a8ef1556fbf25a5b1a414a6029

    • SHA256

      e8f1a6a1771f9d2a6eea8042d6283c78524e59801bbee0c7574341ee68dbdacd

    • SHA512

      e6e4fc0994ed6b455407eab7c8f068438a5fe4aacc942c5fe3a1f4251730f4c034091e7a1f89833db7e31a30bc704722155331a7bd35b82c194965ecdf10daba

    • SSDEEP

      12288:UHyw6lzVRKzgBg/pgy8mY8uxTE2ifaRUMJfcC:AizV1qx+82iiRUs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks