General

  • Target

    156f32576e18f7ca50e41068cc9cdf00.bin

  • Size

    48KB

  • Sample

    230307-bhfmpsge58

  • MD5

    5fc750534253e856aeeda7e6e8267f4d

  • SHA1

    613b812b476ef03aeb8c16ce430c8e52327b395b

  • SHA256

    4ca195f1c75f2fed90a651dbc265723a373a070c4c0a1a2e9938f860ac8baeaf

  • SHA512

    57c676e89a6a9afb954b8b0b7fbfd0505c7fe73c805ea47677db5be2e953afcf235a826e17a107eaf1d6561e0da205f1fcab9b818678f49ec4f63cfcd8193027

  • SSDEEP

    768:ZcnhRqGs1OVLFYbGsF6/SKuCZgqz7eupMm7ZXdZE5gtR2yQQYUrMnPnSUcHRhCzy:hsFaMcUXT/FpQyQxUwP8Rm4Omzrh

Malware Config

Extracted

Family

redline

Botnet

ME938AR34AedD1aVktgU7jVU63BOwx

C2

51.81.63.206:12562

Attributes
  • auth_value

    04698fe47da731ceb0a486b0e4b3beb1

Targets

    • Target

      41903706e727468cc2571b7a031c9bbfeb4ee3ee37abc521c09196b7bf82f992.exe

    • Size

      113KB

    • MD5

      156f32576e18f7ca50e41068cc9cdf00

    • SHA1

      8ccd026801b52cdb9eb410763f4236c4075c7bca

    • SHA256

      41903706e727468cc2571b7a031c9bbfeb4ee3ee37abc521c09196b7bf82f992

    • SHA512

      d5366250e4c04fcf821f5e04f675f0ebe9feb97422b464e0cf00013207b919d790c3ce49303a7fc91956081809066d00a375ba342bd1f3fb32b48defef12f435

    • SSDEEP

      1536:fvZi55zWamDfjpo9mfjkCp4JqFkZe0OaSBUmJbu3zqgzFX0wuei++nYcto:fxqZWPJaskHJCjnaSBFeuIFXhQi

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks