General

  • Target

    626fbb44a33e0f24b8913976f43efe51a9ece4f7df12666038ca8dd5f8c18176

  • Size

    354KB

  • Sample

    230320-f2m84sbh73

  • MD5

    a1c5e48632fa5047d51343df24fc3844

  • SHA1

    856e5ffb324feff1395c40759de548fb10ed9a2a

  • SHA256

    626fbb44a33e0f24b8913976f43efe51a9ece4f7df12666038ca8dd5f8c18176

  • SHA512

    344178691b95b656fd6a51b129d81bb966a684d7b32c636c12e1085bcf3ee0b4d903f44592b0035a2f78ac6f8dd44e119368c1d246fd1cd5d975e5cc9064c4e5

  • SSDEEP

    6144:B+2Lrja90KhHFtgvdvgTbimHNQ85KlI3WIJUmd:B+2XG90KwvgHim551WIq

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      626fbb44a33e0f24b8913976f43efe51a9ece4f7df12666038ca8dd5f8c18176

    • Size

      354KB

    • MD5

      a1c5e48632fa5047d51343df24fc3844

    • SHA1

      856e5ffb324feff1395c40759de548fb10ed9a2a

    • SHA256

      626fbb44a33e0f24b8913976f43efe51a9ece4f7df12666038ca8dd5f8c18176

    • SHA512

      344178691b95b656fd6a51b129d81bb966a684d7b32c636c12e1085bcf3ee0b4d903f44592b0035a2f78ac6f8dd44e119368c1d246fd1cd5d975e5cc9064c4e5

    • SSDEEP

      6144:B+2Lrja90KhHFtgvdvgTbimHNQ85KlI3WIJUmd:B+2XG90KwvgHim551WIq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks