General

  • Target

    903e2b02b7e5029358fa26c6e47cd70f258080ea433fca157a5ee5e294d76a18

  • Size

    425KB

  • Sample

    230318-w4r8vadc59

  • MD5

    d8d1877926d254fe3f660e82287c473f

  • SHA1

    80a000f352a4c9f675479ba99593e1f97110568f

  • SHA256

    903e2b02b7e5029358fa26c6e47cd70f258080ea433fca157a5ee5e294d76a18

  • SHA512

    20a2f62c602debbc29942400e3ffae8f3bafa2ad6dadefe58ea3916ffe4857191a1eb7659c957f96b26b5fc7e1749955236b1dcbf6594631b0c5a6172786dc81

  • SSDEEP

    6144:ZpVCvELIeiM3EHyYLpKSQ9fM769eoOySuUd5X2d0oVfoLI:YvE8eiM3ESUfz76FOruUk0muI

Malware Config

Extracted

Family

redline

Botnet

@chicago

C2

185.11.61.125:22344

Attributes
  • auth_value

    21f863e0cbd09d0681058e068d0d1d7f

Targets

    • Target

      903e2b02b7e5029358fa26c6e47cd70f258080ea433fca157a5ee5e294d76a18

    • Size

      425KB

    • MD5

      d8d1877926d254fe3f660e82287c473f

    • SHA1

      80a000f352a4c9f675479ba99593e1f97110568f

    • SHA256

      903e2b02b7e5029358fa26c6e47cd70f258080ea433fca157a5ee5e294d76a18

    • SHA512

      20a2f62c602debbc29942400e3ffae8f3bafa2ad6dadefe58ea3916ffe4857191a1eb7659c957f96b26b5fc7e1749955236b1dcbf6594631b0c5a6172786dc81

    • SSDEEP

      6144:ZpVCvELIeiM3EHyYLpKSQ9fM769eoOySuUd5X2d0oVfoLI:YvE8eiM3ESUfz76FOruUk0muI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks