General

  • Target

    00d6172871d9e129543f01e1f38c0007.exe

  • Size

    349KB

  • Sample

    221222-fhd64adh54

  • MD5

    00d6172871d9e129543f01e1f38c0007

  • SHA1

    b4177bb0afd79725a31b91b5192496c22ee04a22

  • SHA256

    33e5d9e5ee92fdd041c3076b19204eb2d1971fe0c9739b5381dbdc0e63aa3ced

  • SHA512

    6205b44bbd9d90be5a20604d5efd033ce692e519305ace1e3a9e03cd33085855a0af5c484d58b11259539e151b3d771b047cbd8c7e5a7f3084bb84b052ad5b56

  • SSDEEP

    6144:ehLH1Bt1eb6vvl5OX3IJ99VYYyHAdtr2rMNCs1uyROELJV:ehD11syl5gO9V5yHAHrijyROS

Malware Config

Extracted

Family

redline

Botnet

slovo

C2

31.41.244.198:4083

Attributes
  • auth_value

    b6b22620ca671043ee40c053d9ea48a7

Targets

    • Target

      00d6172871d9e129543f01e1f38c0007.exe

    • Size

      349KB

    • MD5

      00d6172871d9e129543f01e1f38c0007

    • SHA1

      b4177bb0afd79725a31b91b5192496c22ee04a22

    • SHA256

      33e5d9e5ee92fdd041c3076b19204eb2d1971fe0c9739b5381dbdc0e63aa3ced

    • SHA512

      6205b44bbd9d90be5a20604d5efd033ce692e519305ace1e3a9e03cd33085855a0af5c484d58b11259539e151b3d771b047cbd8c7e5a7f3084bb84b052ad5b56

    • SSDEEP

      6144:ehLH1Bt1eb6vvl5OX3IJ99VYYyHAdtr2rMNCs1uyROELJV:ehD11syl5gO9V5yHAHrijyROS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks