General

  • Target

    7f506fc1ce726c7fff6ee29e31be136e166ab1c220a3cdc045ed3524d753a82a

  • Size

    359KB

  • Sample

    230103-ffbyyshg69

  • MD5

    eb99e15c482fa940141db76c412068de

  • SHA1

    9f6a34d575238f5acfde74621ed40ac81b85c7e6

  • SHA256

    7f506fc1ce726c7fff6ee29e31be136e166ab1c220a3cdc045ed3524d753a82a

  • SHA512

    19168ebe072bac1abec25fa25bd1f4150eb01f3122d77b30fa454409707ad135faf5e855186b62cf7ec4a131447023e44ef7c7ff3890cf0716923878e963dc6b

  • SSDEEP

    6144:zuLlD3QcWJnikayXP0bo8FIEbA6pYJFQ0MeQPlnFQUZY:zuxD3QcWJntx0brIEbA6OFIlnF

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Targets

    • Target

      7f506fc1ce726c7fff6ee29e31be136e166ab1c220a3cdc045ed3524d753a82a

    • Size

      359KB

    • MD5

      eb99e15c482fa940141db76c412068de

    • SHA1

      9f6a34d575238f5acfde74621ed40ac81b85c7e6

    • SHA256

      7f506fc1ce726c7fff6ee29e31be136e166ab1c220a3cdc045ed3524d753a82a

    • SHA512

      19168ebe072bac1abec25fa25bd1f4150eb01f3122d77b30fa454409707ad135faf5e855186b62cf7ec4a131447023e44ef7c7ff3890cf0716923878e963dc6b

    • SSDEEP

      6144:zuLlD3QcWJnikayXP0bo8FIEbA6pYJFQ0MeQPlnFQUZY:zuxD3QcWJntx0brIEbA6OFIlnF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks