General

  • Target

    e5e644f80879f2707329b79e56c32d4d9db70c67ea92af2e2b525f841854a208

  • Size

    337KB

  • Sample

    230202-y3qdzafd23

  • MD5

    4954daa32a6d166bbfbe1747b2e97cdc

  • SHA1

    928ba3bce78cce70a28dac539f204a31addeaacb

  • SHA256

    e5e644f80879f2707329b79e56c32d4d9db70c67ea92af2e2b525f841854a208

  • SHA512

    54fad305b523189d28b5e0ce2968f8a9e98d8561b4c9420f96fa532315d1f0381f80e822f75cb5ffe62d5fe8e3a7ee78d3fe4bd947690725ad02aaec08f40041

  • SSDEEP

    6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

Malware Config

Extracted

Family

redline

Botnet

24.01

C2

37.220.86.164:29170

Attributes
  • auth_value

    1c7f0aa21138601b5201a3a4a0123991

Targets

    • Target

      e5e644f80879f2707329b79e56c32d4d9db70c67ea92af2e2b525f841854a208

    • Size

      337KB

    • MD5

      4954daa32a6d166bbfbe1747b2e97cdc

    • SHA1

      928ba3bce78cce70a28dac539f204a31addeaacb

    • SHA256

      e5e644f80879f2707329b79e56c32d4d9db70c67ea92af2e2b525f841854a208

    • SHA512

      54fad305b523189d28b5e0ce2968f8a9e98d8561b4c9420f96fa532315d1f0381f80e822f75cb5ffe62d5fe8e3a7ee78d3fe4bd947690725ad02aaec08f40041

    • SSDEEP

      6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks