General

  • Target

    c18378eb73756763fce72558d702439ceb4d034b0d3fe5e10cb3d4b5cfed2716

  • Size

    351KB

  • Sample

    221226-jervkafg4s

  • MD5

    37490a491d50063099cc913693e38015

  • SHA1

    30943a9f6f067725c1ebab995ebe547ae39f9c68

  • SHA256

    c18378eb73756763fce72558d702439ceb4d034b0d3fe5e10cb3d4b5cfed2716

  • SHA512

    6b844407422b5310b0b2629368f6c8f34c6efd3a51134cc58f4c1a17aaa2f45b223ece217c945c329b8513a2dab4c4b63390aef24423b7c4ed4282be015b4a60

  • SSDEEP

    6144:lLgxmZPA7FToEMdVLFNOw5mJ29fXtK8DfIbIr:l0xCPA7Fsp3nOYmUxI8r

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Targets

    • Target

      c18378eb73756763fce72558d702439ceb4d034b0d3fe5e10cb3d4b5cfed2716

    • Size

      351KB

    • MD5

      37490a491d50063099cc913693e38015

    • SHA1

      30943a9f6f067725c1ebab995ebe547ae39f9c68

    • SHA256

      c18378eb73756763fce72558d702439ceb4d034b0d3fe5e10cb3d4b5cfed2716

    • SHA512

      6b844407422b5310b0b2629368f6c8f34c6efd3a51134cc58f4c1a17aaa2f45b223ece217c945c329b8513a2dab4c4b63390aef24423b7c4ed4282be015b4a60

    • SSDEEP

      6144:lLgxmZPA7FToEMdVLFNOw5mJ29fXtK8DfIbIr:l0xCPA7Fsp3nOYmUxI8r

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks