General

  • Target

    0182bc12c6baecae97566ede589fc7fb1e78d73598c60af0326e502e97ebeebe

  • Size

    387KB

  • Sample

    230111-fejbmsae35

  • MD5

    74782aa1d60ce603bceec8ed646c966c

  • SHA1

    4ce8fdf0f2af8afb1978dd139e8fdba4340cd816

  • SHA256

    0182bc12c6baecae97566ede589fc7fb1e78d73598c60af0326e502e97ebeebe

  • SHA512

    dbfe86552e0a41a697fc57499eb44f32624fe57f37060126f47cb7aab52f88b41af613c111f735c9329431e2ae86b9119b8c53e062710b8be9715ba7a220c5d7

  • SSDEEP

    6144:EfhOLE3DWu4loJKQvdCACVRosUR+Qz3Huu2sqNng6:EfgI3DWPloEQwT2HRnz3DBqNnd

Malware Config

Extracted

Family

redline

Botnet

debra

C2

62.204.41.211:4065

Attributes
  • auth_value

    24df232a5a333f96ae6fb8b270fed1ff

Targets

    • Target

      0182bc12c6baecae97566ede589fc7fb1e78d73598c60af0326e502e97ebeebe

    • Size

      387KB

    • MD5

      74782aa1d60ce603bceec8ed646c966c

    • SHA1

      4ce8fdf0f2af8afb1978dd139e8fdba4340cd816

    • SHA256

      0182bc12c6baecae97566ede589fc7fb1e78d73598c60af0326e502e97ebeebe

    • SHA512

      dbfe86552e0a41a697fc57499eb44f32624fe57f37060126f47cb7aab52f88b41af613c111f735c9329431e2ae86b9119b8c53e062710b8be9715ba7a220c5d7

    • SSDEEP

      6144:EfhOLE3DWu4loJKQvdCACVRosUR+Qz3Huu2sqNng6:EfgI3DWPloEQwT2HRnz3DBqNnd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks