General

  • Target

    11634184cd6864fd695d3d06bb42d90b2cf2c6941cd1f79c82c6a9bc11069c4d

  • Size

    397KB

  • Sample

    230319-16lajacd7y

  • MD5

    5b586d6e6eed34f51ffe2617e5e18fd8

  • SHA1

    22ef8283dcafbacbe4b74301d24270a23fd508d2

  • SHA256

    11634184cd6864fd695d3d06bb42d90b2cf2c6941cd1f79c82c6a9bc11069c4d

  • SHA512

    5163f85da2a1c0a706d43a47017b3d52cd82c95aacdc0a2510f52e2f3debcf55c5c9d3691cb0df75b510c2821beb9079bdfbf2053ffbd210a19cf72bc331f7fb

  • SSDEEP

    6144:5+mLG8w9eixYIV1CKxGqlyFJPnE8m/aPUhh:5+mq8w9eirVcK7snEz/phh

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      11634184cd6864fd695d3d06bb42d90b2cf2c6941cd1f79c82c6a9bc11069c4d

    • Size

      397KB

    • MD5

      5b586d6e6eed34f51ffe2617e5e18fd8

    • SHA1

      22ef8283dcafbacbe4b74301d24270a23fd508d2

    • SHA256

      11634184cd6864fd695d3d06bb42d90b2cf2c6941cd1f79c82c6a9bc11069c4d

    • SHA512

      5163f85da2a1c0a706d43a47017b3d52cd82c95aacdc0a2510f52e2f3debcf55c5c9d3691cb0df75b510c2821beb9079bdfbf2053ffbd210a19cf72bc331f7fb

    • SSDEEP

      6144:5+mLG8w9eixYIV1CKxGqlyFJPnE8m/aPUhh:5+mq8w9eirVcK7snEz/phh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks