General

  • Target

    681975e2482fafae7b618771bd4f7bb9daeec51856a8ca9c50e32b109a49cbcd

  • Size

    425KB

  • Sample

    230318-z8rdwsdg62

  • MD5

    7e148ff307d47c413a4d4e7e918b1752

  • SHA1

    14dc93701acf74580661c6735399a5c65daba0dc

  • SHA256

    681975e2482fafae7b618771bd4f7bb9daeec51856a8ca9c50e32b109a49cbcd

  • SHA512

    25c9f966b2feb8fda4105d550a5daf8a7e7c576599a988483b2ffa8e1086f824a2ca423e6ef10b8a5a229ccc346e8e4457ce71b70e10f5ac473a2a391e529a0b

  • SSDEEP

    6144:KUdfvCLfm8DMLVtLMmd9L0QFE+u/Ux59bNPH:jvCDm8DiE8SQFJueV1H

Malware Config

Extracted

Family

redline

Botnet

@chicago

C2

185.11.61.125:22344

Attributes
  • auth_value

    21f863e0cbd09d0681058e068d0d1d7f

Targets

    • Target

      681975e2482fafae7b618771bd4f7bb9daeec51856a8ca9c50e32b109a49cbcd

    • Size

      425KB

    • MD5

      7e148ff307d47c413a4d4e7e918b1752

    • SHA1

      14dc93701acf74580661c6735399a5c65daba0dc

    • SHA256

      681975e2482fafae7b618771bd4f7bb9daeec51856a8ca9c50e32b109a49cbcd

    • SHA512

      25c9f966b2feb8fda4105d550a5daf8a7e7c576599a988483b2ffa8e1086f824a2ca423e6ef10b8a5a229ccc346e8e4457ce71b70e10f5ac473a2a391e529a0b

    • SSDEEP

      6144:KUdfvCLfm8DMLVtLMmd9L0QFE+u/Ux59bNPH:jvCDm8DiE8SQFJueV1H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks