General

  • Target

    b70330d2128ca957a1e3fb9ea8ee3d377d5932db24b29a1a8981d6addc93a5a4

  • Size

    458KB

  • Sample

    230109-wlqx3aae4y

  • MD5

    0d307aad43c9920f145ddbb2f7376e2b

  • SHA1

    f02a01c9a30b558363d10c26b716874bf054596d

  • SHA256

    b70330d2128ca957a1e3fb9ea8ee3d377d5932db24b29a1a8981d6addc93a5a4

  • SHA512

    4a5b928c9dedeeccd2c5a94936cc563701accbc51e5b370cfea4d3a072190ae8070ce547552e169cc17767b4dab02577fca2530a6fd4967e788263e7b76eece4

  • SSDEEP

    6144:P9bNmHCX5LSyaZQrSpq0651DZ8+vbBm6Yt7oDpTHwYUyJmf/W:P9bESRrBrcv651Oag6YOtU

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      b70330d2128ca957a1e3fb9ea8ee3d377d5932db24b29a1a8981d6addc93a5a4

    • Size

      458KB

    • MD5

      0d307aad43c9920f145ddbb2f7376e2b

    • SHA1

      f02a01c9a30b558363d10c26b716874bf054596d

    • SHA256

      b70330d2128ca957a1e3fb9ea8ee3d377d5932db24b29a1a8981d6addc93a5a4

    • SHA512

      4a5b928c9dedeeccd2c5a94936cc563701accbc51e5b370cfea4d3a072190ae8070ce547552e169cc17767b4dab02577fca2530a6fd4967e788263e7b76eece4

    • SSDEEP

      6144:P9bNmHCX5LSyaZQrSpq0651DZ8+vbBm6Yt7oDpTHwYUyJmf/W:P9bESRrBrcv651Oag6YOtU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks