General

  • Target

    19ba19f4fae4f5e2804197611495ddd3b24c5ff29226a7174217f8adc5ae32ec

  • Size

    421KB

  • Sample

    221220-labnwscc3z

  • MD5

    9c509a566377a2d8912e70006f75fdf8

  • SHA1

    805c664ea0e3cb9707d99dc2a139166aaddbbc96

  • SHA256

    19ba19f4fae4f5e2804197611495ddd3b24c5ff29226a7174217f8adc5ae32ec

  • SHA512

    636c86174472800291972b0dd3468331e89dd7ad42359bfcec0a2fa5896ea857d6837744a3c6e106a0e66c4fd5eac595d307e186d09fe6a512665f7c01732b61

  • SSDEEP

    6144:54X8yfDLLb+p5eaIVbH0GyMgeDPAQMnYNaCay26g/xqtIbJF:54My7Hb+p5oVqajAHu/ayM/s6lF

Malware Config

Extracted

Family

redline

Botnet

123Love

C2

103.179.184.125:21614

Attributes
  • auth_value

    3e9feabfb1054aa54a0908a3f026789d

Targets

    • Target

      19ba19f4fae4f5e2804197611495ddd3b24c5ff29226a7174217f8adc5ae32ec

    • Size

      421KB

    • MD5

      9c509a566377a2d8912e70006f75fdf8

    • SHA1

      805c664ea0e3cb9707d99dc2a139166aaddbbc96

    • SHA256

      19ba19f4fae4f5e2804197611495ddd3b24c5ff29226a7174217f8adc5ae32ec

    • SHA512

      636c86174472800291972b0dd3468331e89dd7ad42359bfcec0a2fa5896ea857d6837744a3c6e106a0e66c4fd5eac595d307e186d09fe6a512665f7c01732b61

    • SSDEEP

      6144:54X8yfDLLb+p5eaIVbH0GyMgeDPAQMnYNaCay26g/xqtIbJF:54My7Hb+p5oVqajAHu/ayM/s6lF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks