General

  • Target

    0e2f23e9e9711230ef7d10373a10c635.exe

  • Size

    335KB

  • Sample

    230202-htsvqsfd66

  • MD5

    0e2f23e9e9711230ef7d10373a10c635

  • SHA1

    9f1f3d5e9cbdb8003f241dd30c27e28fc84df8a4

  • SHA256

    0b7804cb7e24879a4fe9268bc4c427f5200b99b89c4fab051c6e7500bdeb812c

  • SHA512

    c56bbb2cbc4831a7d90cca742afb60e756d52503dd2000da339e3bc25f87967d1ba35a71b8554921d8483329d6342fca9718c4ceb4c87f9b21fe0c1832b6881b

  • SSDEEP

    6144:13bFCLaAvsdg/MjX6O8APax4kHByIysADFRxLe9sczWGUq:13bA+AvsaMj7aqpRD7xC9TC

Malware Config

Extracted

Family

redline

Botnet

milaf

C2

193.233.20.5:4136

Attributes
  • auth_value

    68aaee25afe3d0ae7d4db09dea02347c

Targets

    • Target

      0e2f23e9e9711230ef7d10373a10c635.exe

    • Size

      335KB

    • MD5

      0e2f23e9e9711230ef7d10373a10c635

    • SHA1

      9f1f3d5e9cbdb8003f241dd30c27e28fc84df8a4

    • SHA256

      0b7804cb7e24879a4fe9268bc4c427f5200b99b89c4fab051c6e7500bdeb812c

    • SHA512

      c56bbb2cbc4831a7d90cca742afb60e756d52503dd2000da339e3bc25f87967d1ba35a71b8554921d8483329d6342fca9718c4ceb4c87f9b21fe0c1832b6881b

    • SSDEEP

      6144:13bFCLaAvsdg/MjX6O8APax4kHByIysADFRxLe9sczWGUq:13bA+AvsaMj7aqpRD7xC9TC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks