General

  • Target

    4c689f43e052b73d869a06939ccf0d71bb0e94e7d4f264ecc311c61052c57093

  • Size

    352KB

  • Sample

    230324-nwec1sea69

  • MD5

    e2e8d39b23faade8023982f16ca6005b

  • SHA1

    f2c26368357c7394856b894dbdbdcfb7861da3a3

  • SHA256

    4c689f43e052b73d869a06939ccf0d71bb0e94e7d4f264ecc311c61052c57093

  • SHA512

    085d8548bbb1abd0f7f2018fe2701c06b37b762c471a4087fc077592995e4799c11a642ca628567122ee83113dfc74d114c583c14ecef870935adaad13debb14

  • SSDEEP

    6144:jWsvpo/SUY+TlZB0MxP/2fvka0+REcd4tzj:isvpoqUYslHdXsca0oEA4tf

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Targets

    • Target

      4c689f43e052b73d869a06939ccf0d71bb0e94e7d4f264ecc311c61052c57093

    • Size

      352KB

    • MD5

      e2e8d39b23faade8023982f16ca6005b

    • SHA1

      f2c26368357c7394856b894dbdbdcfb7861da3a3

    • SHA256

      4c689f43e052b73d869a06939ccf0d71bb0e94e7d4f264ecc311c61052c57093

    • SHA512

      085d8548bbb1abd0f7f2018fe2701c06b37b762c471a4087fc077592995e4799c11a642ca628567122ee83113dfc74d114c583c14ecef870935adaad13debb14

    • SSDEEP

      6144:jWsvpo/SUY+TlZB0MxP/2fvka0+REcd4tzj:isvpoqUYslHdXsca0oEA4tf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks