General

  • Target

    f74d9e2d663272e4b2adf3483b814db642197362af9997698a5b76fe8a7489f9

  • Size

    347KB

  • Sample

    221216-mndabahd3s

  • MD5

    450a09f7502f386d2a2be6c01d1a9f64

  • SHA1

    9ecc8bd60808f1cec493f2f4101f679242adfc21

  • SHA256

    f74d9e2d663272e4b2adf3483b814db642197362af9997698a5b76fe8a7489f9

  • SHA512

    163dda9e4224e04c0e44dba28ef472812cd330d69fd956f35688e899ac2e5f731799115ffe0ffc796e641602bcf3bc0aae9d41a6ff3191746875766c54c654e1

  • SSDEEP

    6144:efkfLSqcQb8EOsCcUZ/f4A8LfyVgl7A9nOtythw0Pu8qMrc:efkfeqxb8EOgUtxCq9nOUE0u8n

Malware Config

Extracted

Family

redline

Botnet

@2023@

C2

193.106.191.138:32796

Attributes
  • auth_value

    ca057e5baadfd0774a34a6a949cd5e69

Targets

    • Target

      f74d9e2d663272e4b2adf3483b814db642197362af9997698a5b76fe8a7489f9

    • Size

      347KB

    • MD5

      450a09f7502f386d2a2be6c01d1a9f64

    • SHA1

      9ecc8bd60808f1cec493f2f4101f679242adfc21

    • SHA256

      f74d9e2d663272e4b2adf3483b814db642197362af9997698a5b76fe8a7489f9

    • SHA512

      163dda9e4224e04c0e44dba28ef472812cd330d69fd956f35688e899ac2e5f731799115ffe0ffc796e641602bcf3bc0aae9d41a6ff3191746875766c54c654e1

    • SSDEEP

      6144:efkfLSqcQb8EOsCcUZ/f4A8LfyVgl7A9nOtythw0Pu8qMrc:efkfeqxb8EOgUtxCq9nOUE0u8n

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks