General

  • Target

    b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3

  • Size

    403KB

  • Sample

    221227-2v6b1agf94

  • MD5

    11dedfaf9988d4db6bddc8a4461a25e1

  • SHA1

    ddcac7ef802b30c60d49893e0a02a93fc1ae2723

  • SHA256

    b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3

  • SHA512

    ac5f0f07d08f5c4b880313eb539bc21c6d2996ec8aede12c925fd032ed4cfbb21fa804940d56955cec9b8e709a9c64fa2e4b2eb489c907a457aa0d01e7c27fa2

  • SSDEEP

    6144:I5LeaJxuJZCd5X5HZPGUEi0y4ZrdS9UZdLaYon5Jk4eROw:4S2uJwd5ppF9MZrXdin5JF

Malware Config

Extracted

Family

redline

Botnet

portu

C2

31.41.244.198:4083

Attributes
  • auth_value

    2bb4259a41338919fb81efc2c9944e97

Targets

    • Target

      b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3

    • Size

      403KB

    • MD5

      11dedfaf9988d4db6bddc8a4461a25e1

    • SHA1

      ddcac7ef802b30c60d49893e0a02a93fc1ae2723

    • SHA256

      b923e11ffd6c1e461cb1b1a51323cc2bf15396a7dfe739b41fa1fb33838cddc3

    • SHA512

      ac5f0f07d08f5c4b880313eb539bc21c6d2996ec8aede12c925fd032ed4cfbb21fa804940d56955cec9b8e709a9c64fa2e4b2eb489c907a457aa0d01e7c27fa2

    • SSDEEP

      6144:I5LeaJxuJZCd5X5HZPGUEi0y4ZrdS9UZdLaYon5Jk4eROw:4S2uJwd5ppF9MZrXdin5JF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks