General

  • Target

    6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938

  • Size

    287KB

  • Sample

    230212-vsgsaseg3v

  • MD5

    5679820c359decb6148df7d1f99dbf24

  • SHA1

    afc2c0c251e62bdcfa1b53ae4f228ba8d734ee9f

  • SHA256

    6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938

  • SHA512

    71d465a2e6accb08a50dc8545792df0c0dd2ea67c06be3462448ce4d76166c12214a8e8b99d994a7303d8b9b7c6f8974b01aa5af206f3f2eed4e59b503731aa9

  • SSDEEP

    6144:AtLrW/o0QaE0UeUCXLfZEKaTovPOmCX0oAWv:AlqQx0HLeK8ovWmM0oAW

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938

    • Size

      287KB

    • MD5

      5679820c359decb6148df7d1f99dbf24

    • SHA1

      afc2c0c251e62bdcfa1b53ae4f228ba8d734ee9f

    • SHA256

      6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938

    • SHA512

      71d465a2e6accb08a50dc8545792df0c0dd2ea67c06be3462448ce4d76166c12214a8e8b99d994a7303d8b9b7c6f8974b01aa5af206f3f2eed4e59b503731aa9

    • SSDEEP

      6144:AtLrW/o0QaE0UeUCXLfZEKaTovPOmCX0oAWv:AlqQx0HLeK8ovWmM0oAW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks