General

  • Target

    df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611

  • Size

    426KB

  • Sample

    230318-q5587see4x

  • MD5

    17154963c2dc45772c40d9ab91bb8428

  • SHA1

    4bc30597894e53fe2e5fc5df77c8fee23a3a3eb7

  • SHA256

    df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611

  • SHA512

    0de4a67832d4474b499acace13b210df449534971b778b1dc7d14db024ba502831d82faa5de500615fd4fb244390464ca5b3b2f5069da405140b7425e5f93219

  • SSDEEP

    6144:RimcTvSLofM+22tEZHAbCYiEMSKu1Ug5/pcc8ErQZyIG:MvSUfM+LcHCGfu1bnVI

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611

    • Size

      426KB

    • MD5

      17154963c2dc45772c40d9ab91bb8428

    • SHA1

      4bc30597894e53fe2e5fc5df77c8fee23a3a3eb7

    • SHA256

      df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611

    • SHA512

      0de4a67832d4474b499acace13b210df449534971b778b1dc7d14db024ba502831d82faa5de500615fd4fb244390464ca5b3b2f5069da405140b7425e5f93219

    • SSDEEP

      6144:RimcTvSLofM+22tEZHAbCYiEMSKu1Ug5/pcc8ErQZyIG:MvSUfM+LcHCGfu1bnVI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks