General

  • Target

    4a868a96665651699d4b9544b28d395a789ef3cfa6cb0400a9cff71bf5a0cb7d

  • Size

    306KB

  • Sample

    230103-17yx1sda87

  • MD5

    3ea13f80110dd61a815da6e24b788766

  • SHA1

    bfa63542bbc53590e5347df0a1268c6cae89ff22

  • SHA256

    4a868a96665651699d4b9544b28d395a789ef3cfa6cb0400a9cff71bf5a0cb7d

  • SHA512

    832dcaf554c9a1641bde546b7972521dea4878aee728cc402b3ada32a69635784e0b8716b009a14bb125e687ecf86221e8346415b9c2cb705a12434092449114

  • SSDEEP

    6144:QLObod1V9+tL7GlXWknanLONFZT/yCct3AbH5sb:QCbKT9+d7QXWzaxq/3qH

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Targets

    • Target

      4a868a96665651699d4b9544b28d395a789ef3cfa6cb0400a9cff71bf5a0cb7d

    • Size

      306KB

    • MD5

      3ea13f80110dd61a815da6e24b788766

    • SHA1

      bfa63542bbc53590e5347df0a1268c6cae89ff22

    • SHA256

      4a868a96665651699d4b9544b28d395a789ef3cfa6cb0400a9cff71bf5a0cb7d

    • SHA512

      832dcaf554c9a1641bde546b7972521dea4878aee728cc402b3ada32a69635784e0b8716b009a14bb125e687ecf86221e8346415b9c2cb705a12434092449114

    • SSDEEP

      6144:QLObod1V9+tL7GlXWknanLONFZT/yCct3AbH5sb:QCbKT9+d7QXWzaxq/3qH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks