General

  • Target

    file.exe

  • Size

    381KB

  • Sample

    230325-masg3scb95

  • MD5

    a342936e11f57553224d8ad35c8dfd10

  • SHA1

    57a76e0d39bb4e5f3fb3e4318198f8699481e1ab

  • SHA256

    d42e1281ff7a4da445ac1564ad6fd060eedacfbc3768968ba617976fdea5c7b9

  • SHA512

    a400588a0ee2e191bfd8b2ab32b3188d5020a5e8e526a6f6a321f74592d67220fde909095c08c5b5522fc53c6762f534c7bb7857fcb197bf37d8a53cde4f0390

  • SSDEEP

    6144:DU+/RShadZ4vSb5cv2NZWrQw2q7D3ao7M9TjGMke77G076/qTfm:DU+/RSIdZD9cv2NZW8w22y9/GMke7V7U

Malware Config

Extracted

Family

redline

Botnet

@chicago

C2

185.11.61.125:22344

Attributes
  • auth_value

    21f863e0cbd09d0681058e068d0d1d7f

Targets

    • Target

      file.exe

    • Size

      381KB

    • MD5

      a342936e11f57553224d8ad35c8dfd10

    • SHA1

      57a76e0d39bb4e5f3fb3e4318198f8699481e1ab

    • SHA256

      d42e1281ff7a4da445ac1564ad6fd060eedacfbc3768968ba617976fdea5c7b9

    • SHA512

      a400588a0ee2e191bfd8b2ab32b3188d5020a5e8e526a6f6a321f74592d67220fde909095c08c5b5522fc53c6762f534c7bb7857fcb197bf37d8a53cde4f0390

    • SSDEEP

      6144:DU+/RShadZ4vSb5cv2NZWrQw2q7D3ao7M9TjGMke77G076/qTfm:DU+/RSIdZD9cv2NZW8w22y9/GMke7V7U

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks