General

  • Target

    f1074bc9cb0c7cefd8973240b8230c42400ac98792922fa8a7670f3757ea6ddb

  • Size

    348KB

  • Sample

    230322-fsce9afa29

  • MD5

    11846ffb3afa56d47aebf1252339667b

  • SHA1

    71e576b3220e39c3766df40e20ea8cf68b7834c3

  • SHA256

    f1074bc9cb0c7cefd8973240b8230c42400ac98792922fa8a7670f3757ea6ddb

  • SHA512

    6ed55737b69b00798f7fe7c4bff2c82987d5f8b00165b61ec3e8ac7a79ad669a6ce23d703f393e5510f880db551b2146b953a591c159503bbe94ebed8c4fafaf

  • SSDEEP

    3072:l1D9cOud5qsVfRQLm9LUU6PLpmum8CNj3ps9QzXUmT2DVASEjlnm5ZkQs9CTEMUb:npVI4LgLUU6DWj3NbUV2lrodUeyY3R2

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      f1074bc9cb0c7cefd8973240b8230c42400ac98792922fa8a7670f3757ea6ddb

    • Size

      348KB

    • MD5

      11846ffb3afa56d47aebf1252339667b

    • SHA1

      71e576b3220e39c3766df40e20ea8cf68b7834c3

    • SHA256

      f1074bc9cb0c7cefd8973240b8230c42400ac98792922fa8a7670f3757ea6ddb

    • SHA512

      6ed55737b69b00798f7fe7c4bff2c82987d5f8b00165b61ec3e8ac7a79ad669a6ce23d703f393e5510f880db551b2146b953a591c159503bbe94ebed8c4fafaf

    • SSDEEP

      3072:l1D9cOud5qsVfRQLm9LUU6PLpmum8CNj3ps9QzXUmT2DVASEjlnm5ZkQs9CTEMUb:npVI4LgLUU6DWj3NbUV2lrodUeyY3R2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks