General

  • Target

    4c02e504565d94d533b1135e72f7420ea812b7b19791d7a4eb4f0b6a86531344

  • Size

    349KB

  • Sample

    221228-strb1sdg6v

  • MD5

    5d10fa39518664af83733fbc432b549a

  • SHA1

    b793e25c8c57b3d7c9d30bca5213c9069ea6d886

  • SHA256

    4c02e504565d94d533b1135e72f7420ea812b7b19791d7a4eb4f0b6a86531344

  • SHA512

    d21e921af1f058b71f48c0d7dc2b36bb045270bd833997f75aa6e5d4a9157105372dea4610f30ce8724b127594fe4f2ae56b6fa7028c2bf9065c2673af8445d8

  • SSDEEP

    6144:aLQssI8DgqjBQqpX5b9rnFSO9Tb2gIB5YJj/xTi3tm:a8BpjBQqR5xnoO9TagwYJ9Ti3tm

Malware Config

Extracted

Family

redline

Botnet

shakur

C2

31.41.244.198:4083

Attributes
  • auth_value

    77cf57cf0231c3bc6ab7b37cc351aa82

Targets

    • Target

      4c02e504565d94d533b1135e72f7420ea812b7b19791d7a4eb4f0b6a86531344

    • Size

      349KB

    • MD5

      5d10fa39518664af83733fbc432b549a

    • SHA1

      b793e25c8c57b3d7c9d30bca5213c9069ea6d886

    • SHA256

      4c02e504565d94d533b1135e72f7420ea812b7b19791d7a4eb4f0b6a86531344

    • SHA512

      d21e921af1f058b71f48c0d7dc2b36bb045270bd833997f75aa6e5d4a9157105372dea4610f30ce8724b127594fe4f2ae56b6fa7028c2bf9065c2673af8445d8

    • SSDEEP

      6144:aLQssI8DgqjBQqpX5b9rnFSO9Tb2gIB5YJj/xTi3tm:a8BpjBQqR5xnoO9TagwYJ9Ti3tm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks