General

  • Target

    144443f828b14aa5f6f82e516a951ffae266052f38122312faa7e3eae922ed6b

  • Size

    359KB

  • Sample

    230115-dj2yfahb76

  • MD5

    8061b7f236c43d036c55240acdc31e71

  • SHA1

    109c1b0c0576e4e4b37fb5086df88d935f7ab99e

  • SHA256

    144443f828b14aa5f6f82e516a951ffae266052f38122312faa7e3eae922ed6b

  • SHA512

    f38ee4c19efd81c630e2d466dc0e5a1256be3eb21f0c533aa2381a91238a0c050ce70a15812438a5e17363d8f8130e34808ef47c459a55736d0cf0f7c148581e

  • SSDEEP

    6144:KHkr3E4D73BTRK3xF6FtDeI5tw06SXTPweTH/ML3SfOTjFyIZYUFSoG6p:KHkr3E4DTBTRK3xIFlvtwWXT4eD/lG/x

Malware Config

Extracted

Family

redline

Botnet

@new@2023

C2

77.73.133.62:22344

Attributes
  • auth_value

    8284279aedaed026a9b7cb9c1c0be4e4

Targets

    • Target

      144443f828b14aa5f6f82e516a951ffae266052f38122312faa7e3eae922ed6b

    • Size

      359KB

    • MD5

      8061b7f236c43d036c55240acdc31e71

    • SHA1

      109c1b0c0576e4e4b37fb5086df88d935f7ab99e

    • SHA256

      144443f828b14aa5f6f82e516a951ffae266052f38122312faa7e3eae922ed6b

    • SHA512

      f38ee4c19efd81c630e2d466dc0e5a1256be3eb21f0c533aa2381a91238a0c050ce70a15812438a5e17363d8f8130e34808ef47c459a55736d0cf0f7c148581e

    • SSDEEP

      6144:KHkr3E4D73BTRK3xF6FtDeI5tw06SXTPweTH/ML3SfOTjFyIZYUFSoG6p:KHkr3E4DTBTRK3xIFlvtwWXT4eD/lG/x

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks