General

  • Target

    e2c6a9a1f7b98ef80a162f0f302a91341c7d8c9e2feeebc6b271e0e7fe247899

  • Size

    283KB

  • Sample

    230112-w6ds8shb52

  • MD5

    1b648f9e1ab2e2f30ba3023fdd6f3bb1

  • SHA1

    ee04ae3300f8f74b84afe47433b4a42641348196

  • SHA256

    43fa1f35e29e9723f3959a67f4843c56d6d000798318a30022c2831be76912bd

  • SHA512

    b4f492c5678489bb974ea53d70a0f1762965c53911ebbc30921ab4bf7e1c2d5fbcf002419c382cae336d79aacbeffbdc917d47f1fc4eab6c25947817c996f361

  • SSDEEP

    6144:l2mLH8JHl0nZi2yTR65+eVqyvAbYgZ7L9VXjHeh0mWOaIb:l2dFdTR65HVqyvAn7L9VzohEIb

Malware Config

Extracted

Family

redline

Botnet

@2023@New

C2

91.215.85.155:32796

Attributes
  • auth_value

    0be5b9b84cd5b707e91a48e341e3f7d7

Targets

    • Target

      e2c6a9a1f7b98ef80a162f0f302a91341c7d8c9e2feeebc6b271e0e7fe247899

    • Size

      382KB

    • MD5

      37a0780879cad909c9294ef95d86fb81

    • SHA1

      b115ae2a592620d5fe1ee17fbe883087b5042cda

    • SHA256

      e2c6a9a1f7b98ef80a162f0f302a91341c7d8c9e2feeebc6b271e0e7fe247899

    • SHA512

      0aa5e0b38765edee7114ee21af62729ab510e3a7a459994dd9dff73e0ae4c975b58a3871490312204d2b9f54057446e583a2bfebe47e3b440d5b3074687cb362

    • SSDEEP

      6144:xjYLhZsC66SWk0nni2yTR65WeVqyvAnYgZ21vvFQRdRJHNGpMskFQH2Yp:xjY1ZQTR65PVqyvAj21vvCRNHURkFo2Y

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks