General

  • Target

    f425db30917f82eec0fe948383952e4caf51f79d1638a6393db2f5636b09d08f

  • Size

    382KB

  • Sample

    221226-s6gncadb39

  • MD5

    532a3ac59fee56610611cb4da77a946a

  • SHA1

    8b652c638bfe89ed0ecbb4ef43c9167153846c8d

  • SHA256

    f425db30917f82eec0fe948383952e4caf51f79d1638a6393db2f5636b09d08f

  • SHA512

    5df39a67f8f9de651c0f3a43fe34fa24a7fd50ff761481bece7fa5abbbc592f2de9773b9511446fce5a4c26ae714e5a1617d3fdc60ad2f3f25cc0fdc42eb01b7

  • SSDEEP

    6144:YLSDLeHnNTFSqWug1iD7Dp9AyVhDVCyMmECIXrF/WtE1GMjH55+Vl7l:YeDLWFS14DcahDU5mOFetE1djZgX

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      f425db30917f82eec0fe948383952e4caf51f79d1638a6393db2f5636b09d08f

    • Size

      382KB

    • MD5

      532a3ac59fee56610611cb4da77a946a

    • SHA1

      8b652c638bfe89ed0ecbb4ef43c9167153846c8d

    • SHA256

      f425db30917f82eec0fe948383952e4caf51f79d1638a6393db2f5636b09d08f

    • SHA512

      5df39a67f8f9de651c0f3a43fe34fa24a7fd50ff761481bece7fa5abbbc592f2de9773b9511446fce5a4c26ae714e5a1617d3fdc60ad2f3f25cc0fdc42eb01b7

    • SSDEEP

      6144:YLSDLeHnNTFSqWug1iD7Dp9AyVhDVCyMmECIXrF/WtE1GMjH55+Vl7l:YeDLWFS14DcahDU5mOFetE1djZgX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks