General

  • Target

    73faee5b8e0c291ab060dbdced277ce71e68857fa290a1f4b5bb47b4e34b5ed3

  • Size

    466KB

  • Sample

    230104-cfd7jadf43

  • MD5

    97f5f63f743034858e6d19d1c7b8cc55

  • SHA1

    f14222806b260055aa3feb67bbccfc9774e144d9

  • SHA256

    73faee5b8e0c291ab060dbdced277ce71e68857fa290a1f4b5bb47b4e34b5ed3

  • SHA512

    31945d664994d356f3933f255e2c2a4604a875cb6511edcf360ea5225e416701bfde3274a09831852f3344e1ca1bb44af6b25fc1af1b6339b8861004cc76dd89

  • SSDEEP

    12288:/EkofNlSNk/H6YGtB0rMiNGDDPAyxfVGsI:/gamfav3VDDP3xtZ

Malware Config

Extracted

Family

redline

Botnet

sport

C2

31.41.244.98:4063

Attributes
  • auth_value

    82cce55eeb56b322651e98032c09d225

Targets

    • Target

      73faee5b8e0c291ab060dbdced277ce71e68857fa290a1f4b5bb47b4e34b5ed3

    • Size

      466KB

    • MD5

      97f5f63f743034858e6d19d1c7b8cc55

    • SHA1

      f14222806b260055aa3feb67bbccfc9774e144d9

    • SHA256

      73faee5b8e0c291ab060dbdced277ce71e68857fa290a1f4b5bb47b4e34b5ed3

    • SHA512

      31945d664994d356f3933f255e2c2a4604a875cb6511edcf360ea5225e416701bfde3274a09831852f3344e1ca1bb44af6b25fc1af1b6339b8861004cc76dd89

    • SSDEEP

      12288:/EkofNlSNk/H6YGtB0rMiNGDDPAyxfVGsI:/gamfav3VDDP3xtZ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks