General

  • Target

    0dcb7f44095aa1afbaf134b107d8efd1.bin

  • Size

    50KB

  • Sample

    230130-qcntfscb6x

  • MD5

    5375e4d64d7567ad02561953fd4ed840

  • SHA1

    0f195d62483d5a7060e299fb024f8e0a8ad72e9a

  • SHA256

    451c729e0e6a1f45c6ea51a95ff9bee4b5cb1dbb2e8c8ef635f66d652d681cfd

  • SHA512

    d69cfd06c3111fbbe11b5c43c4eeb4e1b86ac3eccc25a9687af0d8ebccb36af162268a478ad031307c2827da763d7c1c1e05b5945353b03cff0fde607554b367

  • SSDEEP

    1536:WNAaun8ek2ZaQwmEgw84spVLB5wz5DYr5ZZSG9vsg:uAaun872ZHwmEPc5y5kNZZSG9vv

Malware Config

Extracted

Family

redline

Botnet

@avangardow_krutim

C2

168.119.228.126:11552

Attributes
  • auth_value

    7d477650adea2e459a346ec55a0c86ff

Targets

    • Target

      2f2b059f28121a74d3d56189c02692387e5c0469f89ad091ee49a1eebce92cc2.exe

    • Size

      175KB

    • MD5

      0dcb7f44095aa1afbaf134b107d8efd1

    • SHA1

      12026286f031a596144d7fe48da0c49428802ad4

    • SHA256

      2f2b059f28121a74d3d56189c02692387e5c0469f89ad091ee49a1eebce92cc2

    • SHA512

      57a23ba53b49d31ee243baeedab8766d0eaf757f1b066ed5b1373a75ae464649a4db1b2021758dff3886f92c05587f503cc33b64ce3598798721f418190b7d41

    • SSDEEP

      3072:mxqZWjnacI0iLMROUqcwwewE9vh+HxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jV:MqZ7MROLvdvh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks