General

  • Target

    tmp

  • Size

    285KB

  • Sample

    230214-qz44ysdg56

  • MD5

    b7649de5628e2c6b2be40b6d2fe115c5

  • SHA1

    57d0fd392ebb4e40e17f2a3fecd4521d04281f32

  • SHA256

    f9be3f2ebd3654b7ecc41d482840872e1daaede423dff221f925acc4c72a6ce3

  • SHA512

    15b522d904a2fc02da8b72bde79ea79c59f4e82dce79ce4c3c8e101c2eb0c301975bbc35c8f7540a67f629639ef0572ea25a8586e9b2534de6157ff2f1e6f0fe

  • SSDEEP

    6144:oGCAaaeg4kNjQJCw+wY2GMMIRFx+rbCzUDuYgkUQQBoZTEx:ozBa98Cw02GMNR8CzUyYgzQQBoZT

Malware Config

Extracted

Family

redline

C2

103.169.34.87:27368

Attributes
  • auth_value

    1d94fda3ddcc4ef8ddfa653de2b43bb4

Targets

    • Target

      tmp

    • Size

      285KB

    • MD5

      b7649de5628e2c6b2be40b6d2fe115c5

    • SHA1

      57d0fd392ebb4e40e17f2a3fecd4521d04281f32

    • SHA256

      f9be3f2ebd3654b7ecc41d482840872e1daaede423dff221f925acc4c72a6ce3

    • SHA512

      15b522d904a2fc02da8b72bde79ea79c59f4e82dce79ce4c3c8e101c2eb0c301975bbc35c8f7540a67f629639ef0572ea25a8586e9b2534de6157ff2f1e6f0fe

    • SSDEEP

      6144:oGCAaaeg4kNjQJCw+wY2GMMIRFx+rbCzUDuYgkUQQBoZTEx:ozBa98Cw02GMNR8CzUyYgzQQBoZT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks