General

  • Target

    d8fc3434a00b7ab79cdccb41a5dcd0dc373353fd0da916f042095017e70b57f3

  • Size

    137KB

  • Sample

    221027-2kascaeafr

  • MD5

    0eeaf9bbbc588217d2d3d91db2147ab1

  • SHA1

    11bed4a9dedd2c38793485cf44ce01f9280cc799

  • SHA256

    d8fc3434a00b7ab79cdccb41a5dcd0dc373353fd0da916f042095017e70b57f3

  • SHA512

    ccd35b414084f974a5bc55f0276efd2c61e36c71310781c34f821f0787debf2282562ef8d4012a9c9f1606dde8ca071b4a7adb94221380db17d28b105faccaeb

  • SSDEEP

    3072:TYO/ZMTFf/4Y7DcN5eNdQO5izV3gDFzSRXlhhSSQP:TYMZMBf/4Yk2dQOk1gUBlh

Malware Config

Extracted

Family

redline

Botnet

High

C2

80.66.87.20:80

Attributes
  • auth_value

    e5a19803f83e644a0008c2114f6c607e

Targets

    • Target

      d8fc3434a00b7ab79cdccb41a5dcd0dc373353fd0da916f042095017e70b57f3

    • Size

      137KB

    • MD5

      0eeaf9bbbc588217d2d3d91db2147ab1

    • SHA1

      11bed4a9dedd2c38793485cf44ce01f9280cc799

    • SHA256

      d8fc3434a00b7ab79cdccb41a5dcd0dc373353fd0da916f042095017e70b57f3

    • SHA512

      ccd35b414084f974a5bc55f0276efd2c61e36c71310781c34f821f0787debf2282562ef8d4012a9c9f1606dde8ca071b4a7adb94221380db17d28b105faccaeb

    • SSDEEP

      3072:TYO/ZMTFf/4Y7DcN5eNdQO5izV3gDFzSRXlhhSSQP:TYMZMBf/4Yk2dQOk1gUBlh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks