General

  • Target

    tmp

  • Size

    137KB

  • Sample

    221201-y5a23agf37

  • MD5

    f9fd1c41152be65372a95aa482c0ee9d

  • SHA1

    0b3290edd05e7bd6d1d4ec30226533fb54d0c62d

  • SHA256

    47ef63815e62c44ab52f5034c2dac4ee6dbb043c5745c88197e666fa1cee9084

  • SHA512

    6fd2844ff80ac65554497f6315502aa522544782f1f8f0c5c718ce3b7a90758f2a1a250eba7a65ea2aafa0b604381822ce1fe6d4a879193a601b178bd32b4030

  • SSDEEP

    3072:fYO/ZMTFxF+wI4T1p+ac9JEy+noWFVyRP5hNSS0T:fYMZMBxFzIOkaC+oHp5h

Malware Config

Extracted

Family

redline

Botnet

myfile

C2

18.220.118.211:37733

Attributes
  • auth_value

    90b715db3f4c0e3cf3d43bcda516644f

Targets

    • Target

      tmp

    • Size

      137KB

    • MD5

      f9fd1c41152be65372a95aa482c0ee9d

    • SHA1

      0b3290edd05e7bd6d1d4ec30226533fb54d0c62d

    • SHA256

      47ef63815e62c44ab52f5034c2dac4ee6dbb043c5745c88197e666fa1cee9084

    • SHA512

      6fd2844ff80ac65554497f6315502aa522544782f1f8f0c5c718ce3b7a90758f2a1a250eba7a65ea2aafa0b604381822ce1fe6d4a879193a601b178bd32b4030

    • SSDEEP

      3072:fYO/ZMTFxF+wI4T1p+ac9JEy+noWFVyRP5hNSS0T:fYMZMBxFzIOkaC+oHp5h

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks