General

  • Target

    4ef5ca783683885afaa08e24ac65140a3d7ba006112d1ee915dc92a4f9c6ec64

  • Size

    336KB

  • Sample

    230202-pn2n1sgb99

  • MD5

    820fa99efb2b1a9c15393d33834449f7

  • SHA1

    67160b01bb39f3e69440f20af4657162bc13d4d3

  • SHA256

    4ef5ca783683885afaa08e24ac65140a3d7ba006112d1ee915dc92a4f9c6ec64

  • SHA512

    2c587587f5bd786f1809b9491023458c04025468102c76e907a33a1204d1ceee751590db39173dbd5c59ae87926240a0d0e11501bbc5907c1f703b6b542a9eaa

  • SSDEEP

    6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

Malware Config

Extracted

Family

redline

Botnet

24.01

C2

37.220.86.164:29170

Attributes
  • auth_value

    1c7f0aa21138601b5201a3a4a0123991

Targets

    • Target

      4ef5ca783683885afaa08e24ac65140a3d7ba006112d1ee915dc92a4f9c6ec64

    • Size

      336KB

    • MD5

      820fa99efb2b1a9c15393d33834449f7

    • SHA1

      67160b01bb39f3e69440f20af4657162bc13d4d3

    • SHA256

      4ef5ca783683885afaa08e24ac65140a3d7ba006112d1ee915dc92a4f9c6ec64

    • SHA512

      2c587587f5bd786f1809b9491023458c04025468102c76e907a33a1204d1ceee751590db39173dbd5c59ae87926240a0d0e11501bbc5907c1f703b6b542a9eaa

    • SSDEEP

      6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks