General

  • Target

    file.exe

  • Size

    432KB

  • Sample

    230106-1c2enaca35

  • MD5

    20e37089ced0e3bb1a1a3e01f12754dd

  • SHA1

    08fd04e2599af62f1a41cbf640edfffc804f79cf

  • SHA256

    0f656c5c5d2e47f1286e430f74c496d739f9d9282cddc4de2ecc1feb10430a73

  • SHA512

    9bf8c0cb152c4ad2bd7b72fe69feb2f20476df582d83dc9233101b363f6e79c60853cadf78d9155fc7274cddb7c097cc2599bb4a06fa623e9962133d11e6b7c6

  • SSDEEP

    12288:r3xTEGnGGlAYs29gUlOLAxLDBzYK9Ef+11pS:r3NbnreYl3MYvBzxA+/pS

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      file.exe

    • Size

      432KB

    • MD5

      20e37089ced0e3bb1a1a3e01f12754dd

    • SHA1

      08fd04e2599af62f1a41cbf640edfffc804f79cf

    • SHA256

      0f656c5c5d2e47f1286e430f74c496d739f9d9282cddc4de2ecc1feb10430a73

    • SHA512

      9bf8c0cb152c4ad2bd7b72fe69feb2f20476df582d83dc9233101b363f6e79c60853cadf78d9155fc7274cddb7c097cc2599bb4a06fa623e9962133d11e6b7c6

    • SSDEEP

      12288:r3xTEGnGGlAYs29gUlOLAxLDBzYK9Ef+11pS:r3NbnreYl3MYvBzxA+/pS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks