General

  • Target

    166716ef25f71ad25850966b8193dad610df835d7d2e83e0ec93fcaeed5fe936

  • Size

    425KB

  • Sample

    230319-ct72rsee59

  • MD5

    94a83f2c66fc577283c0904c40251f70

  • SHA1

    91f10c154209682f62b25cb19b3ddbc0a2e715bb

  • SHA256

    166716ef25f71ad25850966b8193dad610df835d7d2e83e0ec93fcaeed5fe936

  • SHA512

    fea33e4fa277242f29ac935b14702eaa99da45938195ea47c92e2865ddc1003ffd058c610d135ec0fcfcc0ac2980d2ff3e71a44954fcd02c887cdb267deef7b7

  • SSDEEP

    6144:PnumjvLLmCIcYbc/+MGt6my4EHoJEKvYBTPH:2MvLyCIcYbc/+MRh4UoBwNH

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      166716ef25f71ad25850966b8193dad610df835d7d2e83e0ec93fcaeed5fe936

    • Size

      425KB

    • MD5

      94a83f2c66fc577283c0904c40251f70

    • SHA1

      91f10c154209682f62b25cb19b3ddbc0a2e715bb

    • SHA256

      166716ef25f71ad25850966b8193dad610df835d7d2e83e0ec93fcaeed5fe936

    • SHA512

      fea33e4fa277242f29ac935b14702eaa99da45938195ea47c92e2865ddc1003ffd058c610d135ec0fcfcc0ac2980d2ff3e71a44954fcd02c887cdb267deef7b7

    • SSDEEP

      6144:PnumjvLLmCIcYbc/+MGt6my4EHoJEKvYBTPH:2MvLyCIcYbc/+MRh4UoBwNH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix

Command and Control

Defense Evasion

Execution

Exfiltration

Impact

Initial Access

Lateral Movement

Persistence

Privilege Escalation

Tasks