General

  • Target

    0d7a07f3cb180732dd8576fce683618a1d8b456ee383b9aff4b021dabf867762

  • Size

    302KB

  • Sample

    230203-17b39aeg4x

  • MD5

    0548994c04ac6ac26e042098b01f6a7b

  • SHA1

    7111bacdb5390a12c07a851d4e8d3f03d698206f

  • SHA256

    0d7a07f3cb180732dd8576fce683618a1d8b456ee383b9aff4b021dabf867762

  • SHA512

    28160af289f0bc7494a169b07f3ddf3c85174dd8fe69ebccff04bc6a4d444583e5c12b9b410e32385b57db15e7e58db87fa81bb168e19c5ebad1405a16405a79

  • SSDEEP

    6144:AeM0iL0cT324r8vEUM/hg3Fnf/ET9tXYnsgHrVUz4VYUZ:AeM0iN324ovtMhg3Ff/4tXYLLVUcz

Malware Config

Extracted

Family

redline

Botnet

1B

C2

198.244.249.186:21458

Attributes
  • auth_value

    bee4d371f0fa3cf3cd994a3d339a0ded

Targets

    • Target

      0d7a07f3cb180732dd8576fce683618a1d8b456ee383b9aff4b021dabf867762

    • Size

      302KB

    • MD5

      0548994c04ac6ac26e042098b01f6a7b

    • SHA1

      7111bacdb5390a12c07a851d4e8d3f03d698206f

    • SHA256

      0d7a07f3cb180732dd8576fce683618a1d8b456ee383b9aff4b021dabf867762

    • SHA512

      28160af289f0bc7494a169b07f3ddf3c85174dd8fe69ebccff04bc6a4d444583e5c12b9b410e32385b57db15e7e58db87fa81bb168e19c5ebad1405a16405a79

    • SSDEEP

      6144:AeM0iL0cT324r8vEUM/hg3Fnf/ET9tXYnsgHrVUz4VYUZ:AeM0iN324ovtMhg3Ff/4tXYLLVUcz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks