General

  • Target

    d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3

  • Size

    456KB

  • Sample

    230210-mtgjxsbh74

  • MD5

    38843698815444b78bb8a73cb2a55e1c

  • SHA1

    823d3bca57c0ef79b64b736e0b856b15eb8a1427

  • SHA256

    d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3

  • SHA512

    86ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f

  • SSDEEP

    6144:q0lu6aSHczn//H4D6HMbPFn21BxBdrnfWxj6T/:qVSGU6HM7RMBnfWY/

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Targets

    • Target

      d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3

    • Size

      456KB

    • MD5

      38843698815444b78bb8a73cb2a55e1c

    • SHA1

      823d3bca57c0ef79b64b736e0b856b15eb8a1427

    • SHA256

      d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3

    • SHA512

      86ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f

    • SSDEEP

      6144:q0lu6aSHczn//H4D6HMbPFn21BxBdrnfWxj6T/:qVSGU6HM7RMBnfWY/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks