General

  • Target

    tmp

  • Size

    175KB

  • Sample

    230215-sv3fnscc4v

  • MD5

    ce5ef6aac94fdb2af40da676f6cab58f

  • SHA1

    c393f24b1550955a686ee39067f20813415af95f

  • SHA256

    ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

  • SHA512

    2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

  • SSDEEP

    3072:9xqZWFFa7E6T8mAje3595hUfxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+ct:HqZc1q5h

Malware Config

Extracted

Family

redline

Botnet

cr10n

C2

176.113.115.17:4132

Attributes
  • auth_value

    6016c19179aa1044c369adb0ec1f363b

Targets

    • Target

      tmp

    • Size

      175KB

    • MD5

      ce5ef6aac94fdb2af40da676f6cab58f

    • SHA1

      c393f24b1550955a686ee39067f20813415af95f

    • SHA256

      ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

    • SHA512

      2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

    • SSDEEP

      3072:9xqZWFFa7E6T8mAje3595hUfxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+ct:HqZc1q5h

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks