General

  • Target

    75517e683e81171572dab2526e9583d31c679744b12b251d7d6c6cf14f83f21a

  • Size

    361KB

  • Sample

    221110-hglkwshddj

  • MD5

    8e0a35d381761556ab5c1ea006d876e4

  • SHA1

    cfdeb868b14c3a74479ed1ac1d1c6f842a707dab

  • SHA256

    75517e683e81171572dab2526e9583d31c679744b12b251d7d6c6cf14f83f21a

  • SHA512

    d963c6d90bf0b126802f1aee7fb895431af574d635d1edddab1e1c27b930926b6bdf33d3da66ba0e6dbd346715ecfa6fbd0d1858ca62be2e535525a3ade3a905

  • SSDEEP

    6144:pQ3p/OMWl2N+NanZEMTv+H18iy0YUFGhHve9A0zoaT7Vrm37CX4QdXHgoE9njCoe:ulbNRZEQvHNUFG1vGA0zoaT7Vrm37CXB

Malware Config

Extracted

Family

redline

Botnet

REDLINE

C2

80.66.87.60:80

Attributes
  • auth_value

    0031c8881e219bb78b7e6bf19f4b67c1

Targets

    • Target

      75517e683e81171572dab2526e9583d31c679744b12b251d7d6c6cf14f83f21a

    • Size

      361KB

    • MD5

      8e0a35d381761556ab5c1ea006d876e4

    • SHA1

      cfdeb868b14c3a74479ed1ac1d1c6f842a707dab

    • SHA256

      75517e683e81171572dab2526e9583d31c679744b12b251d7d6c6cf14f83f21a

    • SHA512

      d963c6d90bf0b126802f1aee7fb895431af574d635d1edddab1e1c27b930926b6bdf33d3da66ba0e6dbd346715ecfa6fbd0d1858ca62be2e535525a3ade3a905

    • SSDEEP

      6144:pQ3p/OMWl2N+NanZEMTv+H18iy0YUFGhHve9A0zoaT7Vrm37CX4QdXHgoE9njCoe:ulbNRZEQvHNUFG1vGA0zoaT7Vrm37CXB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks