General

  • Target

    542c56d9b524964fbd1466d1fbbc3b5dce784dee14214ec0a62dbeedea08fb5a

  • Size

    338KB

  • Sample

    230202-3kz8nsgh99

  • MD5

    33621945fac3aa7df293d4ef852379b1

  • SHA1

    105153a581ec0ea7c7b6e66e417e45a8d9a90fb4

  • SHA256

    542c56d9b524964fbd1466d1fbbc3b5dce784dee14214ec0a62dbeedea08fb5a

  • SHA512

    96aa9e69574ced719b428373684f8b6dbe1e41f02a042c54f65e6eb53a7d0970350563de039f0c3b50520d60967c3d2503b509902abc4f2948327910135ee1c7

  • SSDEEP

    6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

Malware Config

Extracted

Family

redline

Botnet

24.01

C2

37.220.86.164:29170

Attributes
  • auth_value

    1c7f0aa21138601b5201a3a4a0123991

Targets

    • Target

      542c56d9b524964fbd1466d1fbbc3b5dce784dee14214ec0a62dbeedea08fb5a

    • Size

      338KB

    • MD5

      33621945fac3aa7df293d4ef852379b1

    • SHA1

      105153a581ec0ea7c7b6e66e417e45a8d9a90fb4

    • SHA256

      542c56d9b524964fbd1466d1fbbc3b5dce784dee14214ec0a62dbeedea08fb5a

    • SHA512

      96aa9e69574ced719b428373684f8b6dbe1e41f02a042c54f65e6eb53a7d0970350563de039f0c3b50520d60967c3d2503b509902abc4f2948327910135ee1c7

    • SSDEEP

      6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks