General

  • Target

    51a9ee280a11810507257d97660ebcee38ea34e27e40b94b2754d4026254e6c2

  • Size

    420KB

  • Sample

    230208-2ljrmsaa26

  • MD5

    4b688c8f8f7a6f75e8664b2838783e4e

  • SHA1

    19965b40fd7c7623d0566f8182bac40533400ef1

  • SHA256

    51a9ee280a11810507257d97660ebcee38ea34e27e40b94b2754d4026254e6c2

  • SHA512

    54b6387683c5854f43ededcea00fb32e1d52b1972703f59d61c6b54bae9d07f3bcd76b00132047560a690a7a906a7f45d8f72ef7eac9c1d6cfc480a95ff76bec

  • SSDEEP

    3072:FPgQVWpvn5RF2T+yzXXlDahFMZkxKknsdnjflQr2o7pCQg9FZxNU5rv7ZGVpoKFB:F3OdPMXlDahBAk7pCQY+ljZqoLiqfvG

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Targets

    • Target

      51a9ee280a11810507257d97660ebcee38ea34e27e40b94b2754d4026254e6c2

    • Size

      420KB

    • MD5

      4b688c8f8f7a6f75e8664b2838783e4e

    • SHA1

      19965b40fd7c7623d0566f8182bac40533400ef1

    • SHA256

      51a9ee280a11810507257d97660ebcee38ea34e27e40b94b2754d4026254e6c2

    • SHA512

      54b6387683c5854f43ededcea00fb32e1d52b1972703f59d61c6b54bae9d07f3bcd76b00132047560a690a7a906a7f45d8f72ef7eac9c1d6cfc480a95ff76bec

    • SSDEEP

      3072:FPgQVWpvn5RF2T+yzXXlDahFMZkxKknsdnjflQr2o7pCQg9FZxNU5rv7ZGVpoKFB:F3OdPMXlDahBAk7pCQY+ljZqoLiqfvG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks