General

  • Target

    a9b7b2771cc2b3345a3b02b1a5fba4fb6828cc05b1bbbc7c69009bd530c25335

  • Size

    275KB

  • Sample

    221017-tz6jkacefn

  • MD5

    22b269d4dab583ca3cde2aeec47a5cbf

  • SHA1

    539963d75071a77ecbaaf2bd5fee2c41ad3bf398

  • SHA256

    a9b7b2771cc2b3345a3b02b1a5fba4fb6828cc05b1bbbc7c69009bd530c25335

  • SHA512

    5033a3e4f53e9089c5d8971e58603a83b7f9151c20eb2bdfbe1fd408126d7d7097ff8eed2610c5d5238f9a5f5134c2837da3d2c3ec02d4ee15f3193a2cca45d2

  • SSDEEP

    6144:KEq6I1/s8o1qOW80cWYBhhNqNKisTskc8QcrSw:an/jOIyZNqNCeSl

Malware Config

Extracted

Family

redline

Botnet

20221001

C2

89.22.235.53:16640

Attributes
  • auth_value

    7c7a8658971281de82db43a3b9284d97

Targets

    • Target

      頂通-秘密教學.exe

    • Size

      365KB

    • MD5

      bf39e7a86c8a03b0426cecdf168b7e0b

    • SHA1

      eed580837a13c657eb1604705c95942b80f2a482

    • SHA256

      857072690ec85093decb9c837a6150ba11a596213d48f81bd2014fe811d95295

    • SHA512

      8fc3673453b1f4da92dcbff6f0917d3b04b4e88ff65cc3be96bd982084bdd1ccfd400e64e62c0b26586230119b809b3a1acc6db6d6b5ca1c84f4bc48f3fa7d09

    • SSDEEP

      6144:tXv9NvGCLQCkyhX80cWeBhh/qNKisTsIlUcvTUHdpJMVV2o:tXv9NvfECkyhd8Z/qNCIsT2dXK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks