General

  • Target

    f0e86a2c2b69d806ecf753e88bc075033046a5da39b2e19f5649bc0d753ee9dd

  • Size

    350KB

  • Sample

    221226-qegsxsgb6s

  • MD5

    dfcfd08da411e772227c50418890dc16

  • SHA1

    4a597f9a938232aba321a636fd387a5048d9901f

  • SHA256

    f0e86a2c2b69d806ecf753e88bc075033046a5da39b2e19f5649bc0d753ee9dd

  • SHA512

    64db183ff1b6174941fbbab32fd2e8aea36ca99c7e8d4fc81310ffa614895d19ab5ea85ba09500667d4f733f8a5fdf13d35ab7f311a8de380dc3fed101fd0915

  • SSDEEP

    6144:OLT1Qg4TSEmmZoLKRt1ndPN8HOz3/VmHFD+Vl7l:O/OFxBxN8HmVm4X

Malware Config

Extracted

Family

redline

Botnet

trud

C2

31.41.244.198:4083

Attributes
  • auth_value

    a5942e18edc400a8c1782120906798ef

Targets

    • Target

      f0e86a2c2b69d806ecf753e88bc075033046a5da39b2e19f5649bc0d753ee9dd

    • Size

      350KB

    • MD5

      dfcfd08da411e772227c50418890dc16

    • SHA1

      4a597f9a938232aba321a636fd387a5048d9901f

    • SHA256

      f0e86a2c2b69d806ecf753e88bc075033046a5da39b2e19f5649bc0d753ee9dd

    • SHA512

      64db183ff1b6174941fbbab32fd2e8aea36ca99c7e8d4fc81310ffa614895d19ab5ea85ba09500667d4f733f8a5fdf13d35ab7f311a8de380dc3fed101fd0915

    • SSDEEP

      6144:OLT1Qg4TSEmmZoLKRt1ndPN8HOz3/VmHFD+Vl7l:O/OFxBxN8HmVm4X

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks