General

  • Target

    4c7502552a1d15a91553f3b54d841503ed1aa5bcf742f789b06a966c38b58fd8

  • Size

    343KB

  • Sample

    221225-hh5p6aed2s

  • MD5

    0d4131d2d28bdd46ebcb42762015d873

  • SHA1

    1ac1734b866dc601e339f4581cbb311976d9050f

  • SHA256

    4c7502552a1d15a91553f3b54d841503ed1aa5bcf742f789b06a966c38b58fd8

  • SHA512

    0e6110f1b3d6afcc3d73ca627f11b640ece94f0de4aca9c201d4d2d6662a1fb9b87d1ad127fd0bd4ca53d217afd7001f3de9db06baa057dc02c0ed2668a5318d

  • SSDEEP

    6144:zduLFrYwwHMfWn9rDtznAv9MFhKpLJMxIs5ifaomRr14aMd1:sZR8n91nAvGKpVs5ikVg

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Targets

    • Target

      4c7502552a1d15a91553f3b54d841503ed1aa5bcf742f789b06a966c38b58fd8

    • Size

      343KB

    • MD5

      0d4131d2d28bdd46ebcb42762015d873

    • SHA1

      1ac1734b866dc601e339f4581cbb311976d9050f

    • SHA256

      4c7502552a1d15a91553f3b54d841503ed1aa5bcf742f789b06a966c38b58fd8

    • SHA512

      0e6110f1b3d6afcc3d73ca627f11b640ece94f0de4aca9c201d4d2d6662a1fb9b87d1ad127fd0bd4ca53d217afd7001f3de9db06baa057dc02c0ed2668a5318d

    • SSDEEP

      6144:zduLFrYwwHMfWn9rDtznAv9MFhKpLJMxIs5ifaomRr14aMd1:sZR8n91nAvGKpVs5ikVg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks