General

  • Target

    8f401b6b3d9ebbbe02cd4cfdab95298c83a5d1498a3093e7b4e708d70929347c

  • Size

    470KB

  • Sample

    230322-zaemfabb68

  • MD5

    ca2e9b01ca06562405e999d047771bc9

  • SHA1

    fc909ff80012b29a1410cfa314ecee52df1245e3

  • SHA256

    8f401b6b3d9ebbbe02cd4cfdab95298c83a5d1498a3093e7b4e708d70929347c

  • SHA512

    b2721a99d091d71d4757366b7314ea62fe4ed595ec0ce44255fe09dc0deb0c794e54b8b7cc7aa8bf43753c960ece95fc96b6a72ad11b7635cd079391f135f458

  • SSDEEP

    6144:ZufwF8yuNiKoK5vwJ2tG9MheXxzGk4DC0DDcB:WwF8iKoKmJsGdXxzwDcB

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      8f401b6b3d9ebbbe02cd4cfdab95298c83a5d1498a3093e7b4e708d70929347c

    • Size

      470KB

    • MD5

      ca2e9b01ca06562405e999d047771bc9

    • SHA1

      fc909ff80012b29a1410cfa314ecee52df1245e3

    • SHA256

      8f401b6b3d9ebbbe02cd4cfdab95298c83a5d1498a3093e7b4e708d70929347c

    • SHA512

      b2721a99d091d71d4757366b7314ea62fe4ed595ec0ce44255fe09dc0deb0c794e54b8b7cc7aa8bf43753c960ece95fc96b6a72ad11b7635cd079391f135f458

    • SSDEEP

      6144:ZufwF8yuNiKoK5vwJ2tG9MheXxzGk4DC0DDcB:WwF8iKoKmJsGdXxzwDcB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks