General

  • Target

    2282a4fcfa986d6781501636dfd04375c471e05fdfcb65732b088211bd9fff72

  • Size

    244KB

  • Sample

    221128-b58xrsaf61

  • MD5

    5dbc2bcc6d0c1d7dcbf7b907dfbf24fa

  • SHA1

    86143781d588bdb33c1ec9714347c542f724aa31

  • SHA256

    27c0b469c5ec51c016d1b3030c9677e444ffb598e2bd54e0eff30e4db08816b4

  • SHA512

    fa62698e48cad4a6e6cddbb94871daab924e4ce9e463c4016a2cab562fbe3c8e70fae96cf0b132c43da61dca1e7148b02806f00499a406a8ab75b9b3c5590c73

  • SSDEEP

    6144:P5WpAWKyrngbFLTxNv0ixv548E1DgwxA+L91T+:BWpAWKgqdZZ5MCwC+J1q

Malware Config

Extracted

Family

redline

Botnet

NewYear2023

C2

185.106.92.111:2510

Attributes
  • auth_value

    99e9bde3b38509ea98c3316cc27e6106

Targets

    • Target

      2282a4fcfa986d6781501636dfd04375c471e05fdfcb65732b088211bd9fff72

    • Size

      297KB

    • MD5

      3091f1775af3bb34121b2caddb4eb353

    • SHA1

      1661bf18cf8d266b2c3f1ac50c282dc945e568c8

    • SHA256

      2282a4fcfa986d6781501636dfd04375c471e05fdfcb65732b088211bd9fff72

    • SHA512

      70f1406e446944459f8488db52e7589d399cfb65460028f89a7ad58d1ddc93d68ffdb942f929c1674df26adaf6478caed1c7fef2798ae490b6bfefa7ddb0b348

    • SSDEEP

      3072:y2p5O2LdPuwEPS5rgI6FffwBzqTXtDNUmsSY2zJhB1ruvixX/cKA788sI441Dg3Z:v3l/EBf9TxNvsixv548s1Dgwxg+6f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks