General

  • Target

    94553cc4a73b089360fe002b7f7d1909f84e64890f12d7514a667562ac504191

  • Size

    362KB

  • Sample

    221031-gcqtdaaca4

  • MD5

    533c57cd24c44f8c468435db9cf0d98c

  • SHA1

    d92eb284dff00f566292a218e583626e0e07e630

  • SHA256

    94553cc4a73b089360fe002b7f7d1909f84e64890f12d7514a667562ac504191

  • SHA512

    24d649d37094d29aa6d577df1cd9878d01690194698e48728265447180a4dacafdcacb6cbc7ddb6eff123b610e88fa4330fe6e1bab6ecd2863b3866f56df5f06

  • SSDEEP

    6144:uBMTQMDLhj9AQqVzvlTYiiVNVyyyVCvmdpcXMqFAB2:uB5elj9AXxi6yMt2

Malware Config

Extracted

Family

redline

Botnet

doz

C2

193.106.191.21:47242

Attributes
  • auth_value

    0c1f6245fdf34473eba636d447c5c2a3

Targets

    • Target

      94553cc4a73b089360fe002b7f7d1909f84e64890f12d7514a667562ac504191

    • Size

      362KB

    • MD5

      533c57cd24c44f8c468435db9cf0d98c

    • SHA1

      d92eb284dff00f566292a218e583626e0e07e630

    • SHA256

      94553cc4a73b089360fe002b7f7d1909f84e64890f12d7514a667562ac504191

    • SHA512

      24d649d37094d29aa6d577df1cd9878d01690194698e48728265447180a4dacafdcacb6cbc7ddb6eff123b610e88fa4330fe6e1bab6ecd2863b3866f56df5f06

    • SSDEEP

      6144:uBMTQMDLhj9AQqVzvlTYiiVNVyyyVCvmdpcXMqFAB2:uB5elj9AXxi6yMt2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks