General

  • Target

    6b289d5e93ae46c6e6555d687f0fb2178951c552ffdb3b5a6b74e729f9865ab3

  • Size

    346KB

  • Sample

    230323-mqh9cafa85

  • MD5

    bb1db8687b4a2e0a0f47503452701c84

  • SHA1

    725fe197074e375c2fdc1ae5e1b4cb4e10a43a68

  • SHA256

    6b289d5e93ae46c6e6555d687f0fb2178951c552ffdb3b5a6b74e729f9865ab3

  • SHA512

    e03c9892035536c2608b07aa14bcf678891746cd10cd2a3c68a59df49096f79efd3db6e5706820ec98abc8c5eee9885a742b015b1fafab6bd78640e5abc727fe

  • SSDEEP

    6144:Hz8aLjL+k6+7/hHrIOSqS/+TmTDxYmLa:4aLjak6+7/hLI/

Malware Config

Extracted

Family

redline

Botnet

wast2

C2

wastxcenter.com:80

Attributes
  • auth_value

    f766ddc319bda57aa79a19df6ddfb85e

Targets

    • Target

      6b289d5e93ae46c6e6555d687f0fb2178951c552ffdb3b5a6b74e729f9865ab3

    • Size

      346KB

    • MD5

      bb1db8687b4a2e0a0f47503452701c84

    • SHA1

      725fe197074e375c2fdc1ae5e1b4cb4e10a43a68

    • SHA256

      6b289d5e93ae46c6e6555d687f0fb2178951c552ffdb3b5a6b74e729f9865ab3

    • SHA512

      e03c9892035536c2608b07aa14bcf678891746cd10cd2a3c68a59df49096f79efd3db6e5706820ec98abc8c5eee9885a742b015b1fafab6bd78640e5abc727fe

    • SSDEEP

      6144:Hz8aLjL+k6+7/hHrIOSqS/+TmTDxYmLa:4aLjak6+7/hLI/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks