General

  • Target

    bb62ff2c326de5bacc7a8331c406c4e5a51823c584a0bf98f4cb66611d319fb0

  • Size

    284KB

  • Sample

    230320-qtbkfsdf93

  • MD5

    14c7b6cf0955a1ab28377f5112dd9228

  • SHA1

    257f398411765792e8f8a6f1fd84f299b011a12a

  • SHA256

    bb62ff2c326de5bacc7a8331c406c4e5a51823c584a0bf98f4cb66611d319fb0

  • SHA512

    8630bdbc76ee552b3452110ce1550f9bc813d633c506bd5e94fc75841e96f510505885e677a696f3a75127be44a8d546f8b57d2f70806079a9a9e1fbfd0cc16f

  • SSDEEP

    3072:c/OXv0NWC4MNLBMRH+B5NsTd+e3hu6XDaRmti9TKQH5Wd5TkGhvxKbXjcVwKhFxt:3f0EYP5Nq8PEm0i9WX3V35BtKrA

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      bb62ff2c326de5bacc7a8331c406c4e5a51823c584a0bf98f4cb66611d319fb0

    • Size

      284KB

    • MD5

      14c7b6cf0955a1ab28377f5112dd9228

    • SHA1

      257f398411765792e8f8a6f1fd84f299b011a12a

    • SHA256

      bb62ff2c326de5bacc7a8331c406c4e5a51823c584a0bf98f4cb66611d319fb0

    • SHA512

      8630bdbc76ee552b3452110ce1550f9bc813d633c506bd5e94fc75841e96f510505885e677a696f3a75127be44a8d546f8b57d2f70806079a9a9e1fbfd0cc16f

    • SSDEEP

      3072:c/OXv0NWC4MNLBMRH+B5NsTd+e3hu6XDaRmti9TKQH5Wd5TkGhvxKbXjcVwKhFxt:3f0EYP5Nq8PEm0i9WX3V35BtKrA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks