General

  • Target

    a90e4377e40ca1d3a53ae22fecdd77dfe7a809c5a395be17e5f49cb137975aa5

  • Size

    293KB

  • Sample

    221224-saqldadc8y

  • MD5

    6ca155de0d243b859e0f08c0a1bcb09f

  • SHA1

    bbec0ea3c5419d2aa3649abb6157de34bf6f709e

  • SHA256

    ac754b9ecbbf5a9a96c4d289a58cd479216a4258863df0eb03403a61caa408f0

  • SHA512

    25643d3972c3f0275e08e174abbebea2a39366378872b4e148c4ce51f142c78aab043dbc05141d5cf54d242899a5a46dc8fc17bd9d3f5ad8a014e8d2a4f6c169

  • SSDEEP

    6144:LohuMqaCS9EUs/oDphHLqJ+4RSWkQYM27ZV8pnjGXYrv:L+5TbDfGApWkQYM29V8pL7

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      a90e4377e40ca1d3a53ae22fecdd77dfe7a809c5a395be17e5f49cb137975aa5

    • Size

      378KB

    • MD5

      c2a3586bcc256ef158810548a7ecc1b4

    • SHA1

      cb8d0392a1e66ac8916143f6f3e1de82b92be433

    • SHA256

      a90e4377e40ca1d3a53ae22fecdd77dfe7a809c5a395be17e5f49cb137975aa5

    • SHA512

      76b80fc4689fab06300a8af46f5fba6d817114cf8abd4b2664a5115f30da5a7622156cb58cb3d97f3020c9852908834ea3fa30308cf62bddf618880459a4c433

    • SSDEEP

      6144:fL8FkAmC89QUs/8DphHLqv+4RqWkQYM2RCaMT10T:fQFkpfRDfG2DWkQYM2RlAm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks