General

  • Target

    9b68ef2d32e2a1ca3d0ecf55597f0f06bf71f19319d315dc553b2fb57a955640

  • Size

    354KB

  • Sample

    230323-argexscc79

  • MD5

    d356f23db5d607b770f56cfbe7820f90

  • SHA1

    8c1a84380ebef4951d24daec36418710e7ef8d91

  • SHA256

    9b68ef2d32e2a1ca3d0ecf55597f0f06bf71f19319d315dc553b2fb57a955640

  • SHA512

    0b056ea1211ac88dfd3b5d2139776fe9bf6b665c6ef93a8fee6fd694a30e15045ad6c0c91f9c954cd0d861e958a93422ed684d72f22b0184ff6aa38e908b14ac

  • SSDEEP

    6144:5MtAF9NabgOMUYBZWGFQ+go4S9svXxxIn:StO9NaZMhIiH46sHy

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      9b68ef2d32e2a1ca3d0ecf55597f0f06bf71f19319d315dc553b2fb57a955640

    • Size

      354KB

    • MD5

      d356f23db5d607b770f56cfbe7820f90

    • SHA1

      8c1a84380ebef4951d24daec36418710e7ef8d91

    • SHA256

      9b68ef2d32e2a1ca3d0ecf55597f0f06bf71f19319d315dc553b2fb57a955640

    • SHA512

      0b056ea1211ac88dfd3b5d2139776fe9bf6b665c6ef93a8fee6fd694a30e15045ad6c0c91f9c954cd0d861e958a93422ed684d72f22b0184ff6aa38e908b14ac

    • SSDEEP

      6144:5MtAF9NabgOMUYBZWGFQ+go4S9svXxxIn:StO9NaZMhIiH46sHy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks