General

  • Target

    b844e3f70697b36557704833f491b8c19bfb683fe5e03c4bb488039c8c0e6422

  • Size

    335KB

  • Sample

    221218-18qyssdh46

  • MD5

    246ef065801c2aaac08b7c1c74e4b8bf

  • SHA1

    5c15a2f7a8465a020d1ce72191bb2db76f969130

  • SHA256

    b844e3f70697b36557704833f491b8c19bfb683fe5e03c4bb488039c8c0e6422

  • SHA512

    2ad6be07d6e82678e01295ce3949b41cdf9e3a34ba6685d7400e776e612c1420a5e649cd5e17a31fb79254beb0b21a88337f4f282cd21a52e17a76fcc4ce39bd

  • SSDEEP

    6144:ISv8CkdXnc05wZHGlM8dmOEtcG3/e3ncrAFltsu/lHa:ISixzFacG3/e3ncrAFltsu/lHa

Malware Config

Extracted

Family

redline

Botnet

Upadated.999

C2

185.106.92.214:27015

Attributes
  • auth_value

    a6d503c1c63820e9c4a9b5de84087f3f

Targets

    • Target

      b844e3f70697b36557704833f491b8c19bfb683fe5e03c4bb488039c8c0e6422

    • Size

      335KB

    • MD5

      246ef065801c2aaac08b7c1c74e4b8bf

    • SHA1

      5c15a2f7a8465a020d1ce72191bb2db76f969130

    • SHA256

      b844e3f70697b36557704833f491b8c19bfb683fe5e03c4bb488039c8c0e6422

    • SHA512

      2ad6be07d6e82678e01295ce3949b41cdf9e3a34ba6685d7400e776e612c1420a5e649cd5e17a31fb79254beb0b21a88337f4f282cd21a52e17a76fcc4ce39bd

    • SSDEEP

      6144:ISv8CkdXnc05wZHGlM8dmOEtcG3/e3ncrAFltsu/lHa:ISixzFacG3/e3ncrAFltsu/lHa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks