General

  • Target

    f874dfa86bf86a9bc53e3e05af6280cf02c10f342805b0c298e73d0a18ba73cb

  • Size

    311KB

  • Sample

    230323-vxqk1ahb47

  • MD5

    5938a091b9b7503c9a4b3c237565da02

  • SHA1

    bd70ccc581acb0c9fbecfc27b1ccd7f926f60fea

  • SHA256

    f874dfa86bf86a9bc53e3e05af6280cf02c10f342805b0c298e73d0a18ba73cb

  • SHA512

    70e81b32465076270895aae580d13c5ce5e2d67e547540c9f2598abaa5828c6ffbd1b24f235c9d5acbfe8c95448482318cae5cdbba9d2ee5fbbd69446e5b66e1

  • SSDEEP

    6144:PU8YL7eh6phN+srdtWSQDJlJsBRTNb2mXtazncyELT4gZ9qluUn0:88Yneh6lrHWSCl2HTNbHXQcyeQ

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      f874dfa86bf86a9bc53e3e05af6280cf02c10f342805b0c298e73d0a18ba73cb

    • Size

      311KB

    • MD5

      5938a091b9b7503c9a4b3c237565da02

    • SHA1

      bd70ccc581acb0c9fbecfc27b1ccd7f926f60fea

    • SHA256

      f874dfa86bf86a9bc53e3e05af6280cf02c10f342805b0c298e73d0a18ba73cb

    • SHA512

      70e81b32465076270895aae580d13c5ce5e2d67e547540c9f2598abaa5828c6ffbd1b24f235c9d5acbfe8c95448482318cae5cdbba9d2ee5fbbd69446e5b66e1

    • SSDEEP

      6144:PU8YL7eh6phN+srdtWSQDJlJsBRTNb2mXtazncyELT4gZ9qluUn0:88Yneh6lrHWSCl2HTNbHXQcyeQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks