General

  • Target

    bc8d48dbc67257b76a77e94c1ea40aa7022906d4e2163017ab666d1b04a9fa98

  • Size

    423KB

  • Sample

    230113-v3bc9sah74

  • MD5

    35ec35009921332711e0bea17bdffa07

  • SHA1

    d72544d077cac3ce35f968f4e7cecb555ce3f545

  • SHA256

    bc8d48dbc67257b76a77e94c1ea40aa7022906d4e2163017ab666d1b04a9fa98

  • SHA512

    1a169c6d1990125f48eb2999a881dc08366e6a43e2aa5954c0a9c0eed87eca414cc8993f849160525d366371cde2827b69b2974bb84c2a58baa0fc7a31a44f7a

  • SSDEEP

    6144:B3uCOLnXyIPt7cLgpebJsP5AizurKhpRXoQZTSvXqSlJZ9tzrSA3SSp:B3uDrystOcebKPe56fBZaXPZ9P3SS

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      bc8d48dbc67257b76a77e94c1ea40aa7022906d4e2163017ab666d1b04a9fa98

    • Size

      423KB

    • MD5

      35ec35009921332711e0bea17bdffa07

    • SHA1

      d72544d077cac3ce35f968f4e7cecb555ce3f545

    • SHA256

      bc8d48dbc67257b76a77e94c1ea40aa7022906d4e2163017ab666d1b04a9fa98

    • SHA512

      1a169c6d1990125f48eb2999a881dc08366e6a43e2aa5954c0a9c0eed87eca414cc8993f849160525d366371cde2827b69b2974bb84c2a58baa0fc7a31a44f7a

    • SSDEEP

      6144:B3uCOLnXyIPt7cLgpebJsP5AizurKhpRXoQZTSvXqSlJZ9tzrSA3SSp:B3uDrystOcebKPe56fBZaXPZ9P3SS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks