General

  • Target

    58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9

  • Size

    353KB

  • Sample

    221230-jr8nvaae31

  • MD5

    5d302dc5573f121ac70afea0dadae736

  • SHA1

    81975cbb77e48d8c2038ddc307aaf9fa040d3006

  • SHA256

    58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9

  • SHA512

    5abbb6e790e1d18b86fba4f042564fdaca5222273ee08794925648153c7c28d25254fff551079ea48c9bd48d987dc65dffc13efc38b3f9cd35a504294f6d4e12

  • SSDEEP

    6144:oL9RwhCDta8Pzy4+r+WLjGJiP7GkAQDzcTw9MBo5oIyx3E5:oBRzDs8byjZqizSQDzv6ck

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Targets

    • Target

      58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9

    • Size

      353KB

    • MD5

      5d302dc5573f121ac70afea0dadae736

    • SHA1

      81975cbb77e48d8c2038ddc307aaf9fa040d3006

    • SHA256

      58cbf7ac3797d7ef1eba20e47e5ec7d35751122304e4f35b7f43e7e3f1787aa9

    • SHA512

      5abbb6e790e1d18b86fba4f042564fdaca5222273ee08794925648153c7c28d25254fff551079ea48c9bd48d987dc65dffc13efc38b3f9cd35a504294f6d4e12

    • SSDEEP

      6144:oL9RwhCDta8Pzy4+r+WLjGJiP7GkAQDzcTw9MBo5oIyx3E5:oBRzDs8byjZqizSQDzv6ck

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks