General

  • Target

    6f6b297ab71c825c2eb3455162b3b2c2e06459d32f29350d4be21a415188b39f

  • Size

    413KB

  • Sample

    230114-m5zjwaac3x

  • MD5

    f4d0a29d859e21028878f594726307f2

  • SHA1

    a8717179d8dc1c945d9dd486def306048c617353

  • SHA256

    6f6b297ab71c825c2eb3455162b3b2c2e06459d32f29350d4be21a415188b39f

  • SHA512

    ffc9a72e537a35a0b09fd008f86f6d6873389f30e4a90b0f712d47b2563177ee2e2e8eea28d10816af473bddab5da52372ff5fda48e673d3ce68711e99855059

  • SSDEEP

    6144:G9VcKCYmvL5YegTsOuTv5tS+pkXfn7GbfqbJpgpRjFE:GbcKCX1IsTS+6X/SbCbJSL

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      6f6b297ab71c825c2eb3455162b3b2c2e06459d32f29350d4be21a415188b39f

    • Size

      413KB

    • MD5

      f4d0a29d859e21028878f594726307f2

    • SHA1

      a8717179d8dc1c945d9dd486def306048c617353

    • SHA256

      6f6b297ab71c825c2eb3455162b3b2c2e06459d32f29350d4be21a415188b39f

    • SHA512

      ffc9a72e537a35a0b09fd008f86f6d6873389f30e4a90b0f712d47b2563177ee2e2e8eea28d10816af473bddab5da52372ff5fda48e673d3ce68711e99855059

    • SSDEEP

      6144:G9VcKCYmvL5YegTsOuTv5tS+pkXfn7GbfqbJpgpRjFE:GbcKCX1IsTS+6X/SbCbJSL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks