General

  • Target

    f7701e14acb6236cee78252bf36c70236fed962cb646a27f59cfe32ccbdda023

  • Size

    378KB

  • Sample

    230325-xg5fbsea44

  • MD5

    e23477352b087c8828aa7e3b077ac886

  • SHA1

    0c23d9a2979271efe5df3c8d2a3cab74e9726805

  • SHA256

    f7701e14acb6236cee78252bf36c70236fed962cb646a27f59cfe32ccbdda023

  • SHA512

    f090e63ff9b8c5d3812e3972ad12ac4b6e75746a6f14a1d48a4312bb55e3cbdc68754051029d2a726011fdfbd2ecb620bd987d2ccdf4ab2db250fee643e7fa1f

  • SSDEEP

    6144:aBNCgE+7unAQN6deLbBNeAK88yhVgNRUFTd2UTfz:aBNCgE+6n/Q+NeAKoKRUFTdz

Malware Config

Extracted

Family

redline

Botnet

koreamon

C2

koreamonitoring.com:80

Attributes
  • auth_value

    1a0e1a9f491ef3df873a03577dfa10aa

Targets

    • Target

      f7701e14acb6236cee78252bf36c70236fed962cb646a27f59cfe32ccbdda023

    • Size

      378KB

    • MD5

      e23477352b087c8828aa7e3b077ac886

    • SHA1

      0c23d9a2979271efe5df3c8d2a3cab74e9726805

    • SHA256

      f7701e14acb6236cee78252bf36c70236fed962cb646a27f59cfe32ccbdda023

    • SHA512

      f090e63ff9b8c5d3812e3972ad12ac4b6e75746a6f14a1d48a4312bb55e3cbdc68754051029d2a726011fdfbd2ecb620bd987d2ccdf4ab2db250fee643e7fa1f

    • SSDEEP

      6144:aBNCgE+7unAQN6deLbBNeAK88yhVgNRUFTd2UTfz:aBNCgE+6n/Q+NeAKoKRUFTdz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks