General

  • Target

    ffdac5f06d01a215a72ac718af799d9cd5c3a37ef9579e6d52ddeedf3371be6e

  • Size

    278KB

  • Sample

    230130-2lh54sdb25

  • MD5

    bc708ff52156572c1b3adbce2c5be640

  • SHA1

    c23b3812226edf965d0b91fc4bf1de8ac7350d2f

  • SHA256

    ffdac5f06d01a215a72ac718af799d9cd5c3a37ef9579e6d52ddeedf3371be6e

  • SHA512

    66407fc7b1502c918f3e7d53389b123381b70aa4ab43931a63dd32620a05f535abc7bdf2860ec1ef2b41253886afaf4d70d92fbce83134409800ea149847dcee

  • SSDEEP

    6144:rL0I6QDkQ0t4ZYNCE0CMy1yJbSd3+dYLg:rAI6aZ5E0CyQB

Malware Config

Extracted

Family

redline

Botnet

new

C2

176.113.115.16:4122

Attributes
  • auth_value

    0ae189161615f61e951d226417eab9d5

Targets

    • Target

      ffdac5f06d01a215a72ac718af799d9cd5c3a37ef9579e6d52ddeedf3371be6e

    • Size

      278KB

    • MD5

      bc708ff52156572c1b3adbce2c5be640

    • SHA1

      c23b3812226edf965d0b91fc4bf1de8ac7350d2f

    • SHA256

      ffdac5f06d01a215a72ac718af799d9cd5c3a37ef9579e6d52ddeedf3371be6e

    • SHA512

      66407fc7b1502c918f3e7d53389b123381b70aa4ab43931a63dd32620a05f535abc7bdf2860ec1ef2b41253886afaf4d70d92fbce83134409800ea149847dcee

    • SSDEEP

      6144:rL0I6QDkQ0t4ZYNCE0CMy1yJbSd3+dYLg:rAI6aZ5E0CyQB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks