General

  • Target

    7a2c85115cf05815623227c0d44a950a6655631331eaa9721f1eb1459cdc9d53

  • Size

    322KB

  • Sample

    221201-1jt9xsde22

  • MD5

    9f09b03c972d0c909488f884e65d21eb

  • SHA1

    881a239323b33d61d38904d95376820356b53564

  • SHA256

    7a2c85115cf05815623227c0d44a950a6655631331eaa9721f1eb1459cdc9d53

  • SHA512

    24979be3f014a84635093f9ce0a8b35ac67cfaf86c1716e7aec779f5c0a5d1626d6846856fc8449d8ae5e10ca84798464b88cf836b80730c3064ff8c69fbc701

  • SSDEEP

    6144:uOe7iR9vSXa+8wTIFdfJTgJU7xJid6p4jt/Xf4evprDivpl:uBiR9vSF83jJTTtod6MNX78

Malware Config

Extracted

Family

redline

Botnet

NewDef2023

C2

185.106.92.214:2510

Attributes
  • auth_value

    048f34b18865578890538db10b2e9edf

Targets

    • Target

      7a2c85115cf05815623227c0d44a950a6655631331eaa9721f1eb1459cdc9d53

    • Size

      322KB

    • MD5

      9f09b03c972d0c909488f884e65d21eb

    • SHA1

      881a239323b33d61d38904d95376820356b53564

    • SHA256

      7a2c85115cf05815623227c0d44a950a6655631331eaa9721f1eb1459cdc9d53

    • SHA512

      24979be3f014a84635093f9ce0a8b35ac67cfaf86c1716e7aec779f5c0a5d1626d6846856fc8449d8ae5e10ca84798464b88cf836b80730c3064ff8c69fbc701

    • SSDEEP

      6144:uOe7iR9vSXa+8wTIFdfJTgJU7xJid6p4jt/Xf4evprDivpl:uBiR9vSF83jJTTtod6MNX78

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks