General

  • Target

    d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df

  • Size

    330KB

  • Sample

    221205-l168gsda4w

  • MD5

    0da15cc2749e7117722946f24f941a52

  • SHA1

    466f5d7208af46d10a33efb50235099024ba9d8b

  • SHA256

    d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df

  • SHA512

    e2af593a8babe932d62b2b8f83f55037f31d8650d140b4b839ff3a5f2220d243e4a5e526065f90b8516db73f7fce6ae53f6c76083c4bdf6335c1ec527fea8000

  • SSDEEP

    6144:jhX59jRsF7CJo9dv7r+pkYnT20trTC2Ee2zFCujyDcO02snb:jhX59jRsF2Jyd3+pTT2KC2EAXDvP

Malware Config

Extracted

Family

redline

Botnet

NewDef2023

C2

185.106.92.214:2510

Attributes
  • auth_value

    048f34b18865578890538db10b2e9edf

Targets

    • Target

      d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df

    • Size

      330KB

    • MD5

      0da15cc2749e7117722946f24f941a52

    • SHA1

      466f5d7208af46d10a33efb50235099024ba9d8b

    • SHA256

      d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df

    • SHA512

      e2af593a8babe932d62b2b8f83f55037f31d8650d140b4b839ff3a5f2220d243e4a5e526065f90b8516db73f7fce6ae53f6c76083c4bdf6335c1ec527fea8000

    • SSDEEP

      6144:jhX59jRsF7CJo9dv7r+pkYnT20trTC2Ee2zFCujyDcO02snb:jhX59jRsF2Jyd3+pTT2KC2EAXDvP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks