General

  • Target

    9d1742e92ea15efc8d1cc2a5a8e0289555609a299d48e83c768ce2a04721d38b

  • Size

    351KB

  • Sample

    221226-s4bpbadb29

  • MD5

    1a2660ffa6f467b68ae590c7efac2397

  • SHA1

    d57b63c9f7a9e0028d1ffe1a299e6fd512c43a5f

  • SHA256

    9d1742e92ea15efc8d1cc2a5a8e0289555609a299d48e83c768ce2a04721d38b

  • SHA512

    dd3f8e3bf0a8d5eb31dcb7def6f26cdbdaff335f218e54da3643f6fcfa2bbb809217a78ec91ab8cf14e2c4d34fe2015a21651f5ef5efaa8110fab18de0a79506

  • SSDEEP

    6144:TL/xviPe889JZZks/5cjOVLt8LXdnjHJQ+Vl7l:TzBiWJZOs/5ccEXdnjHX

Malware Config

Extracted

Family

redline

Botnet

shakur

C2

31.41.244.198:4083

Attributes
  • auth_value

    77cf57cf0231c3bc6ab7b37cc351aa82

Targets

    • Target

      9d1742e92ea15efc8d1cc2a5a8e0289555609a299d48e83c768ce2a04721d38b

    • Size

      351KB

    • MD5

      1a2660ffa6f467b68ae590c7efac2397

    • SHA1

      d57b63c9f7a9e0028d1ffe1a299e6fd512c43a5f

    • SHA256

      9d1742e92ea15efc8d1cc2a5a8e0289555609a299d48e83c768ce2a04721d38b

    • SHA512

      dd3f8e3bf0a8d5eb31dcb7def6f26cdbdaff335f218e54da3643f6fcfa2bbb809217a78ec91ab8cf14e2c4d34fe2015a21651f5ef5efaa8110fab18de0a79506

    • SSDEEP

      6144:TL/xviPe889JZZks/5cjOVLt8LXdnjHJQ+Vl7l:TzBiWJZOs/5ccEXdnjHX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks