General

  • Target

    30e9ef1f138f5749c3013c14088b2c14989502545432f6f640a7e981cf920500

  • Size

    359KB

  • Sample

    230103-17qawagd2t

  • MD5

    31c19470e4277ab7795c1fc5bbdc75b7

  • SHA1

    a306f6405df26a89e759b393d559d3724b516ac8

  • SHA256

    30e9ef1f138f5749c3013c14088b2c14989502545432f6f640a7e981cf920500

  • SHA512

    022805d5ecc65b949a409c657c5519328e677f96da8d41fa18800453bd58362c5225c5d202580008d5ba00ecd31c548044b89c91814ab4c083530524ac96554f

  • SSDEEP

    6144:FYLZSdCEEzu9RwuUxNzF0HEIy+TWspcGr66:FYtSdCEE17pEEIVTWo

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Targets

    • Target

      30e9ef1f138f5749c3013c14088b2c14989502545432f6f640a7e981cf920500

    • Size

      359KB

    • MD5

      31c19470e4277ab7795c1fc5bbdc75b7

    • SHA1

      a306f6405df26a89e759b393d559d3724b516ac8

    • SHA256

      30e9ef1f138f5749c3013c14088b2c14989502545432f6f640a7e981cf920500

    • SHA512

      022805d5ecc65b949a409c657c5519328e677f96da8d41fa18800453bd58362c5225c5d202580008d5ba00ecd31c548044b89c91814ab4c083530524ac96554f

    • SSDEEP

      6144:FYLZSdCEEzu9RwuUxNzF0HEIy+TWspcGr66:FYtSdCEE17pEEIVTWo

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks