General

  • Target

    39358afe5b0a7325927137121c54a04de0bf25d9870f38ec3090f7854641346e

  • Size

    413KB

  • Sample

    221230-a645jaef28

  • MD5

    18376c87915c6d7845d7135820735e8f

  • SHA1

    db6bc971f9f4f3bff0f2a62d2c61c7ff4fd50433

  • SHA256

    39358afe5b0a7325927137121c54a04de0bf25d9870f38ec3090f7854641346e

  • SHA512

    bba2ee09f0124bffd453b1368bb74b58778f166a23fdcab695c841b9f8cdb17d46a35976abe1417bb00f2a11c749712a9a4076ac809f07afba14dc9e0042f91b

  • SSDEEP

    6144:JLOBrsLjsZ7s2AMt0KrExnIjiibkCQNB+TL4wUMC40yIxZ1WqqdS49:JCaPsZbnthKnHNwTLGMUdYj

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Targets

    • Target

      39358afe5b0a7325927137121c54a04de0bf25d9870f38ec3090f7854641346e

    • Size

      413KB

    • MD5

      18376c87915c6d7845d7135820735e8f

    • SHA1

      db6bc971f9f4f3bff0f2a62d2c61c7ff4fd50433

    • SHA256

      39358afe5b0a7325927137121c54a04de0bf25d9870f38ec3090f7854641346e

    • SHA512

      bba2ee09f0124bffd453b1368bb74b58778f166a23fdcab695c841b9f8cdb17d46a35976abe1417bb00f2a11c749712a9a4076ac809f07afba14dc9e0042f91b

    • SSDEEP

      6144:JLOBrsLjsZ7s2AMt0KrExnIjiibkCQNB+TL4wUMC40yIxZ1WqqdS49:JCaPsZbnthKnHNwTLGMUdYj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks