General

  • Target

    242b0c9be540184f48aeea903bbb4248f32d3dbc7ab3290b4f90071e957d41b8

  • Size

    416KB

  • Sample

    230321-qtxgxsaf85

  • MD5

    4d1d91725ab65d08dff5d35c377054d2

  • SHA1

    c3138f7e47f44014c2cd69ce49117ee4bae22631

  • SHA256

    242b0c9be540184f48aeea903bbb4248f32d3dbc7ab3290b4f90071e957d41b8

  • SHA512

    0a041272a60aefcf555442deda01a647119d17783d239364476cf563f0f22611464691ad5a90592a76f5100b224b0a5586bd5c724d51003353bf1d5366219843

  • SSDEEP

    6144:CB7LjLit56f9teM8Tmm6uZ7UV+y8DIvARPxbMthmV+0uDc0F3/ecJWGIy:CB7zit5y9teMrmhTRavQ+4k9WG

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      242b0c9be540184f48aeea903bbb4248f32d3dbc7ab3290b4f90071e957d41b8

    • Size

      416KB

    • MD5

      4d1d91725ab65d08dff5d35c377054d2

    • SHA1

      c3138f7e47f44014c2cd69ce49117ee4bae22631

    • SHA256

      242b0c9be540184f48aeea903bbb4248f32d3dbc7ab3290b4f90071e957d41b8

    • SHA512

      0a041272a60aefcf555442deda01a647119d17783d239364476cf563f0f22611464691ad5a90592a76f5100b224b0a5586bd5c724d51003353bf1d5366219843

    • SSDEEP

      6144:CB7LjLit56f9teM8Tmm6uZ7UV+y8DIvARPxbMthmV+0uDc0F3/ecJWGIy:CB7zit5y9teMrmhTRavQ+4k9WG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks