General

  • Target

    03701fd6e2be939b3f3dbeaa0060b97e29aa722b691de990ddcf42832f09f902

  • Size

    271KB

  • Sample

    230101-nzt8msbf22

  • MD5

    70343d41b5f4ccbeb06149ea7b70266e

  • SHA1

    f401f3a59c4488279fc20a0a3e6aacf1344c4bc9

  • SHA256

    f98c9416dfa997c6148a01730b998cb73922b02ff18bac640de558cb298da252

  • SHA512

    edb9944b3e81141790cec6e6cb2d70586ffb2906ec994cd344e08b2eeefb12ef15b15e5d38b7300dfa3f410e6eb576dd3f61a12340e87f3ad1eedcd54640a00b

  • SSDEEP

    6144:rb5DnmOVCvKCsCW7Pfxt7nFi5KH1OEfFssZRZmVYmWct6Oa3qGfyK:BznovKClW7ht7nFqgOP4RkQDOVGfyK

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Targets

    • Target

      03701fd6e2be939b3f3dbeaa0060b97e29aa722b691de990ddcf42832f09f902

    • Size

      359KB

    • MD5

      c6f28ca88b5af014b957b9cd489680c3

    • SHA1

      1c7fd3947a01757236e722041335a5a52f267c12

    • SHA256

      03701fd6e2be939b3f3dbeaa0060b97e29aa722b691de990ddcf42832f09f902

    • SHA512

      a485d474e03fec571d9fedf423f36c38b61d15869baebe9d904d0f50e86114b41992932fe09c508ca10c91cb94abfe7b86dd3bb9fd75ccb43a60c37db54fc55f

    • SSDEEP

      6144:AALb9uySW7Pfxt7TFidKH1OEfFss/RZmVYmWGbKZY:AAf9uzW7ht7TFMgOPcRkQY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks