General

  • Target

    cbc799cb4c0e030278ab87cc17ad40610ec094786591954e6a18c4cfac8895fa

  • Size

    340KB

  • Sample

    230203-ldcelahb5v

  • MD5

    eddb9c1b8ebc366e73a31fcd90a79d47

  • SHA1

    2b22fde1d2489e862615ad65355b1afe28f36a91

  • SHA256

    cbc799cb4c0e030278ab87cc17ad40610ec094786591954e6a18c4cfac8895fa

  • SHA512

    989c715c5c2ff28a075902ac16282fa9631e6631d09d81c68d2fd951793d255cba4bd3117ced2fca2e515c91273b7bc8509ed360f148bc3ae9938bed37f59194

  • SSDEEP

    6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

Malware Config

Extracted

Family

redline

Botnet

24.01

C2

37.220.86.164:29170

Attributes
  • auth_value

    1c7f0aa21138601b5201a3a4a0123991

Targets

    • Target

      cbc799cb4c0e030278ab87cc17ad40610ec094786591954e6a18c4cfac8895fa

    • Size

      340KB

    • MD5

      eddb9c1b8ebc366e73a31fcd90a79d47

    • SHA1

      2b22fde1d2489e862615ad65355b1afe28f36a91

    • SHA256

      cbc799cb4c0e030278ab87cc17ad40610ec094786591954e6a18c4cfac8895fa

    • SHA512

      989c715c5c2ff28a075902ac16282fa9631e6631d09d81c68d2fd951793d255cba4bd3117ced2fca2e515c91273b7bc8509ed360f148bc3ae9938bed37f59194

    • SSDEEP

      6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks