General

  • Target

    ff891d75cbf96e80530df61616e0dd6ffac80468c7b7edd8a2b23d8e6ea39294

  • Size

    263KB

  • Sample

    221106-fhwfdadbc9

  • MD5

    989f53da705536bc360abc4b5f3e9491

  • SHA1

    5b0abd65e1cfc78de2f4316c4c64ce228c8d72b1

  • SHA256

    6d52b7e291a8b174fd7ecf2ff842f9f49d14c2437f94084131ece3a6384280c8

  • SHA512

    53a75b79702c51b97d8630e5730ba7dbb8ddd68717ccf85b40e7ce5b186d9d42003d4d1de42344eae52b7b4241eceab9128ea9e75b36938a07f4afa7695f2a9c

  • SSDEEP

    6144:e1xcxeys/4k6c42RCD03dHsLwO22NKyjxVYG8Zm/76h:37swk9VRCCVsL2CKy37GU6h

Malware Config

Extracted

Family

redline

Botnet

suk

C2

193.106.191.25:47242

Attributes
  • auth_value

    9762d5bcad64c7855837e80c232c7e77

Targets

    • Target

      ff891d75cbf96e80530df61616e0dd6ffac80468c7b7edd8a2b23d8e6ea39294

    • Size

      405KB

    • MD5

      8485eb34c067e91651999c508489ee24

    • SHA1

      8d3444c9e63d5ab05fbee780175dda15779526a8

    • SHA256

      ff891d75cbf96e80530df61616e0dd6ffac80468c7b7edd8a2b23d8e6ea39294

    • SHA512

      4a939af1f0ccf8fc68ed87ce71227bc867ed84981829b57a9f226c8c67c9ac0f9f0138693982473823451b69718a3332bc700e8cc286caa97dcfb9a07cccb2d1

    • SSDEEP

      6144:k3vHRYj8LJuSbs2RCD0TLHsLwO22LKyjRVYGvw:wYj80URCQbsL26KyP7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks