General

  • Target

    file.exe

  • Size

    494KB

  • Sample

    230322-24jjladh7t

  • MD5

    93931e093dd9a3d26ba4143dda1e2e39

  • SHA1

    59e46ef60ebd06b2f2dfdea9e908409e05e5d545

  • SHA256

    cb49c9ebae5f19093ff879409ad00fbe0beb69505058ef97654241451429b6fb

  • SHA512

    ccd925a9a3fb1edf6492d19aeca4584757e1927928f804b10df4e04e5058b303b28ad7ac259088dae821b80cebc1a63c18a9b022fb925a18e9b6ab341c7da7f5

  • SSDEEP

    6144:fxNMja3NmKZkh64FxkPK3lytUiH/9dTYZEoR90CPYPy6bLreqJ:fvMja3kKAdFCPjUq/9SZ/RU/eI

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      file.exe

    • Size

      494KB

    • MD5

      93931e093dd9a3d26ba4143dda1e2e39

    • SHA1

      59e46ef60ebd06b2f2dfdea9e908409e05e5d545

    • SHA256

      cb49c9ebae5f19093ff879409ad00fbe0beb69505058ef97654241451429b6fb

    • SHA512

      ccd925a9a3fb1edf6492d19aeca4584757e1927928f804b10df4e04e5058b303b28ad7ac259088dae821b80cebc1a63c18a9b022fb925a18e9b6ab341c7da7f5

    • SSDEEP

      6144:fxNMja3NmKZkh64FxkPK3lytUiH/9dTYZEoR90CPYPy6bLreqJ:fvMja3kKAdFCPjUq/9SZ/RU/eI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks