General

  • Target

    bae41541f2c334b53fc79d9df1097a69b7737c7feb3dc95dfb8c68991951d960

  • Size

    347KB

  • Sample

    230323-2akvkace4z

  • MD5

    db0a9cc86f8dfa9cf7e0b736c25f362f

  • SHA1

    4afe2f3772f29faff20577ba85427d40dab83699

  • SHA256

    bae41541f2c334b53fc79d9df1097a69b7737c7feb3dc95dfb8c68991951d960

  • SHA512

    c5a238e73098e401f03c80f5b8056d27bf2909dcf6b6f263f964152cbb797a2657311a8373d12ddefcda379547c7add0cd5140bd2bba4195a1ba7e26321a9890

  • SSDEEP

    6144:/XHG2jL366OWJlHbpuIN50+P+ABS+PmHu9cZkLX0cGYMKMwYwA:/3G2jj66OkhLT5983cGYMoYw

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      bae41541f2c334b53fc79d9df1097a69b7737c7feb3dc95dfb8c68991951d960

    • Size

      347KB

    • MD5

      db0a9cc86f8dfa9cf7e0b736c25f362f

    • SHA1

      4afe2f3772f29faff20577ba85427d40dab83699

    • SHA256

      bae41541f2c334b53fc79d9df1097a69b7737c7feb3dc95dfb8c68991951d960

    • SHA512

      c5a238e73098e401f03c80f5b8056d27bf2909dcf6b6f263f964152cbb797a2657311a8373d12ddefcda379547c7add0cd5140bd2bba4195a1ba7e26321a9890

    • SSDEEP

      6144:/XHG2jL366OWJlHbpuIN50+P+ABS+PmHu9cZkLX0cGYMKMwYwA:/3G2jj66OkhLT5983cGYMoYw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks