General

  • Target

    a30e145349a3b684ada555c34a72b572.exe

  • Size

    175KB

  • Sample

    230211-hgb2fsdf71

  • MD5

    a30e145349a3b684ada555c34a72b572

  • SHA1

    651d1282bacff47ec49e485b55a0e2c23f4f0bd0

  • SHA256

    2ef667c2594af7d7fe80917314f652c6857ec18a247ac26555192eedb4e0aab8

  • SHA512

    abd6566f423de31cbc2f44b03b25c0a32d8e3f3adc952056c248dc1aeb4abfcb7eb10dc08c5a51c973dd192588b322d51693f902e7523648f4a13200c67c9667

  • SSDEEP

    3072:+xqZWjHaJIppURJPc2Mwaeeu91hOnxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jj:kqZ3RJPX/X1h

Malware Config

Extracted

Family

redline

Botnet

zaykaYT

C2

82.115.223.77:38358

Attributes
  • auth_value

    64afd32fa89eccfca3c9589e5d13dbff

Targets

    • Target

      a30e145349a3b684ada555c34a72b572.exe

    • Size

      175KB

    • MD5

      a30e145349a3b684ada555c34a72b572

    • SHA1

      651d1282bacff47ec49e485b55a0e2c23f4f0bd0

    • SHA256

      2ef667c2594af7d7fe80917314f652c6857ec18a247ac26555192eedb4e0aab8

    • SHA512

      abd6566f423de31cbc2f44b03b25c0a32d8e3f3adc952056c248dc1aeb4abfcb7eb10dc08c5a51c973dd192588b322d51693f902e7523648f4a13200c67c9667

    • SSDEEP

      3072:+xqZWjHaJIppURJPc2Mwaeeu91hOnxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jj:kqZ3RJPX/X1h

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks