General

  • Target

    tmp

  • Size

    335KB

  • Sample

    230201-kd5wgace95

  • MD5

    56bdc64b3eee515f104a791aa20a21d3

  • SHA1

    73a51bd896d4fed399e7d7b61c6451a63b859a35

  • SHA256

    19f2539486d7b7a3c3c5f2e81851ef4220cdb5adb95778d1b7464fdd2b9f506a

  • SHA512

    6013f67f184e98f25eefa6b7c02ccee15ddfa58ecfba97332df2da2733c1d0be23f04f4d3223ce0f65b698fc8f376825d362418e11668b3de20fc7f65885ebff

  • SSDEEP

    6144:TW8VP8GLrfpAJn2GxgoL0LCNfP4GapzzSqpdGzZn3IkH:TW60GnfpAJ2og+noGUzSqzGFn3

Malware Config

Extracted

Family

redline

Botnet

fredy

C2

62.204.41.170:4132

Attributes
  • auth_value

    880249eef9593d49a1a3cddf57c5cb35

Targets

    • Target

      tmp

    • Size

      335KB

    • MD5

      56bdc64b3eee515f104a791aa20a21d3

    • SHA1

      73a51bd896d4fed399e7d7b61c6451a63b859a35

    • SHA256

      19f2539486d7b7a3c3c5f2e81851ef4220cdb5adb95778d1b7464fdd2b9f506a

    • SHA512

      6013f67f184e98f25eefa6b7c02ccee15ddfa58ecfba97332df2da2733c1d0be23f04f4d3223ce0f65b698fc8f376825d362418e11668b3de20fc7f65885ebff

    • SSDEEP

      6144:TW8VP8GLrfpAJn2GxgoL0LCNfP4GapzzSqpdGzZn3IkH:TW60GnfpAJ2og+noGUzSqzGFn3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks