General

  • Target

    file

  • Size

    328KB

  • Sample

    221023-qc6n9saedn

  • MD5

    4173c4abaedc4476767cc7ae87efdb1f

  • SHA1

    233b52b33ace360879027612ff08e0f090b84325

  • SHA256

    ea47b4e65fbb5469ca342e9e3632eb87c1e2d756ec605f18dd5ffe1f63d22739

  • SHA512

    3ecc8a801eeef0d812ba6b7acc9ac77a9d30344ddc2b58da44327d9751fa90d806a947f476cc762189d31247bd72183f9733cd244cc56b8f78ea04166c959667

  • SSDEEP

    6144:+enLde1gOLu7l0jP/hD3OGym20YQ+Fwiz6c5T6bplSN:1nZeCOLIlC/hD3OGy05+FwXc5eTM

Malware Config

Extracted

Family

redline

Botnet

13

C2

92.118.36.245:21100

Attributes
  • auth_value

    9f9175abcf4bd9f60c9429b6f6160ab8

Targets

    • Target

      file

    • Size

      328KB

    • MD5

      4173c4abaedc4476767cc7ae87efdb1f

    • SHA1

      233b52b33ace360879027612ff08e0f090b84325

    • SHA256

      ea47b4e65fbb5469ca342e9e3632eb87c1e2d756ec605f18dd5ffe1f63d22739

    • SHA512

      3ecc8a801eeef0d812ba6b7acc9ac77a9d30344ddc2b58da44327d9751fa90d806a947f476cc762189d31247bd72183f9733cd244cc56b8f78ea04166c959667

    • SSDEEP

      6144:+enLde1gOLu7l0jP/hD3OGym20YQ+Fwiz6c5T6bplSN:1nZeCOLIlC/hD3OGy05+FwXc5eTM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks