General

  • Target

    e38a4d395f6ff71b1f3a7413e2b6af0aa376a7223e064f9f6a96e2056601314e

  • Size

    196KB

  • Sample

    221018-qye4fagccj

  • MD5

    5e42fcfeca6d9ec685d75f070692564a

  • SHA1

    76a139a767b31b42b5ad007b492dbab7c6d5e1ed

  • SHA256

    e38a4d395f6ff71b1f3a7413e2b6af0aa376a7223e064f9f6a96e2056601314e

  • SHA512

    addfd4414f527b7bfb5b45e7b97d042db15fae976e55512858d3328695d355074671b68b24ea0c771bba15d63e99edeb991211b5152214a0687f9b928a36f15a

  • SSDEEP

    3072:SXD3BLnMCz55BGYQn9nLVFIB2TNq6ydL0Ku5uE0Ah4:SDBLMKYYOFIyqzJ0Jlph4

Malware Config

Extracted

Family

redline

C2

45.15.156.37:110

Attributes
  • auth_value

    5b663effac3b92fe687f0181631eeff2

Targets

    • Target

      e38a4d395f6ff71b1f3a7413e2b6af0aa376a7223e064f9f6a96e2056601314e

    • Size

      196KB

    • MD5

      5e42fcfeca6d9ec685d75f070692564a

    • SHA1

      76a139a767b31b42b5ad007b492dbab7c6d5e1ed

    • SHA256

      e38a4d395f6ff71b1f3a7413e2b6af0aa376a7223e064f9f6a96e2056601314e

    • SHA512

      addfd4414f527b7bfb5b45e7b97d042db15fae976e55512858d3328695d355074671b68b24ea0c771bba15d63e99edeb991211b5152214a0687f9b928a36f15a

    • SSDEEP

      3072:SXD3BLnMCz55BGYQn9nLVFIB2TNq6ydL0Ku5uE0Ah4:SDBLMKYYOFIyqzJ0Jlph4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks