General

  • Target

    89cb087ce8550c37f6ec49763018f6ce0270662158cbb3d6df3bbdf318f8c24e

  • Size

    311KB

  • Sample

    230323-q1hbkshh8y

  • MD5

    8a67249745ba43c40ed83facfd6632b7

  • SHA1

    9e64b58f13e5cb162439a15cb2fa45d6e3b4a092

  • SHA256

    89cb087ce8550c37f6ec49763018f6ce0270662158cbb3d6df3bbdf318f8c24e

  • SHA512

    412e7ba377a02aee722463c5961391ca0eddeb25e8f46acf8dd9a164138374675166186b6f2cf5596739e88701d2559956d46433858801ce6a776bf56b6ac4c8

  • SSDEEP

    6144:k2V8L/Y3oBdYQavKNdHczZrJnLJP2iG5r3tIrVw9Dd8D:HV8DY3oBdjavKjHKZdnLJPinIW9DS

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      89cb087ce8550c37f6ec49763018f6ce0270662158cbb3d6df3bbdf318f8c24e

    • Size

      311KB

    • MD5

      8a67249745ba43c40ed83facfd6632b7

    • SHA1

      9e64b58f13e5cb162439a15cb2fa45d6e3b4a092

    • SHA256

      89cb087ce8550c37f6ec49763018f6ce0270662158cbb3d6df3bbdf318f8c24e

    • SHA512

      412e7ba377a02aee722463c5961391ca0eddeb25e8f46acf8dd9a164138374675166186b6f2cf5596739e88701d2559956d46433858801ce6a776bf56b6ac4c8

    • SSDEEP

      6144:k2V8L/Y3oBdYQavKNdHczZrJnLJP2iG5r3tIrVw9Dd8D:HV8DY3oBdjavKjHKZdnLJPinIW9DS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks