General

  • Target

    6c1b0a6370877b232e230baa8703139865662584854a4f8306c387baa1185b50

  • Size

    321KB

  • Sample

    230204-fe1wpacf27

  • MD5

    657e36feb61d77e8d2d9da0833c9b8e8

  • SHA1

    ae4f4b2115a9fb55910060ad3b2e42e5fa97129b

  • SHA256

    6c1b0a6370877b232e230baa8703139865662584854a4f8306c387baa1185b50

  • SHA512

    52949b4c16c2447e38ca5765d0f3fffaa15325a844cd36baff67f0153c292ead06ed74f641b90e7e8219a7b7c7118697309f8baf1082d877f4ab462b28c8f268

  • SSDEEP

    6144:Eo+L5C9WpFX0FCYtEkHsWE7lL5svyb73KpRoouaVGev5:Eo+1pB0TRE7l9sa73KpZ93v5

Malware Config

Extracted

Family

redline

Botnet

911

C2

77.91.78.218:47779

Attributes
  • auth_value

    2f15da81932003536492c52b1803ea8c

Targets

    • Target

      6c1b0a6370877b232e230baa8703139865662584854a4f8306c387baa1185b50

    • Size

      321KB

    • MD5

      657e36feb61d77e8d2d9da0833c9b8e8

    • SHA1

      ae4f4b2115a9fb55910060ad3b2e42e5fa97129b

    • SHA256

      6c1b0a6370877b232e230baa8703139865662584854a4f8306c387baa1185b50

    • SHA512

      52949b4c16c2447e38ca5765d0f3fffaa15325a844cd36baff67f0153c292ead06ed74f641b90e7e8219a7b7c7118697309f8baf1082d877f4ab462b28c8f268

    • SSDEEP

      6144:Eo+L5C9WpFX0FCYtEkHsWE7lL5svyb73KpRoouaVGev5:Eo+1pB0TRE7l9sa73KpZ93v5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks