General

  • Target

    ac1ecb633ecbd7fed4c661f042dafd8b.exe

  • Size

    297KB

  • Sample

    221125-weksgagd2y

  • MD5

    ac1ecb633ecbd7fed4c661f042dafd8b

  • SHA1

    d0edf0cae17dfb1579fbdd999de885776e95d88f

  • SHA256

    1bff47288ce92dfc991c5fe4154a8ba90a356064eee720a785fabf4564d67365

  • SHA512

    03e7090320f4ffa82dbe30deab1a8ebd57624c0074f5428e117e9144de0222a776176ff4ad6e13a39dc34f54fbdef6b48de71df7a0898a790d047b6970bf55a7

  • SSDEEP

    6144:5sLIL03zPNlzOp+SJgp3RqEdzLwvwWpc0:q0IzPNlSEsgp3RqUwoql

Malware Config

Extracted

Family

redline

Botnet

pops

C2

31.41.244.14:4694

Attributes
  • auth_value

    c377eb074ac3f12f85b0ff38d543b16d

Targets

    • Target

      ac1ecb633ecbd7fed4c661f042dafd8b.exe

    • Size

      297KB

    • MD5

      ac1ecb633ecbd7fed4c661f042dafd8b

    • SHA1

      d0edf0cae17dfb1579fbdd999de885776e95d88f

    • SHA256

      1bff47288ce92dfc991c5fe4154a8ba90a356064eee720a785fabf4564d67365

    • SHA512

      03e7090320f4ffa82dbe30deab1a8ebd57624c0074f5428e117e9144de0222a776176ff4ad6e13a39dc34f54fbdef6b48de71df7a0898a790d047b6970bf55a7

    • SSDEEP

      6144:5sLIL03zPNlzOp+SJgp3RqEdzLwvwWpc0:q0IzPNlSEsgp3RqUwoql

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks