General

  • Target

    a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33.exe

  • Size

    137KB

  • Sample

    221114-dge1wsee28

  • MD5

    e63d74cec6926b2d04e474b889d08af4

  • SHA1

    a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

  • SHA256

    a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

  • SHA512

    fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

  • SSDEEP

    3072:dYO/ZMTFVx+2I3rG1fVLZncHzWF7cRPehvSSYn:dYMZMBVxFISn+zjpeh

Malware Config

Extracted

Family

redline

Botnet

boy

C2

77.73.134.241:4691

Attributes
  • auth_value

    a91fa8cc2cfaefc42a23c03faef44bd3

Targets

    • Target

      a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33.exe

    • Size

      137KB

    • MD5

      e63d74cec6926b2d04e474b889d08af4

    • SHA1

      a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb

    • SHA256

      a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33

    • SHA512

      fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148

    • SSDEEP

      3072:dYO/ZMTFVx+2I3rG1fVLZncHzWF7cRPehvSSYn:dYMZMBVxFISn+zjpeh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks