General

  • Target

    caec330e088ca8c3b8239b59e99bfeec6529e78217d90821389a37114e17a89b

  • Size

    380KB

  • Sample

    230325-zl2aksgd6z

  • MD5

    c26b54db43b24f1eb00bea9cb5aba346

  • SHA1

    a9e36559f2195a48f08bd1be437d0ef07217799d

  • SHA256

    caec330e088ca8c3b8239b59e99bfeec6529e78217d90821389a37114e17a89b

  • SHA512

    9eecf26fb22f2a13efae41028eddc5e2f0b831d05c2bcf678be0c7bcaf31a33b1d8407dd16f75d46ca83b7eb7fba861da8302272ed656a9649a176a9a4fc97ad

  • SSDEEP

    6144:7N+WWT7KBcxpMr4x0H9hOReN1Y3z1NCEAhMjWQANf9yUwlKt2LTfz:7N+WWT2Bi2rqWGNCiSf9Y023z

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      caec330e088ca8c3b8239b59e99bfeec6529e78217d90821389a37114e17a89b

    • Size

      380KB

    • MD5

      c26b54db43b24f1eb00bea9cb5aba346

    • SHA1

      a9e36559f2195a48f08bd1be437d0ef07217799d

    • SHA256

      caec330e088ca8c3b8239b59e99bfeec6529e78217d90821389a37114e17a89b

    • SHA512

      9eecf26fb22f2a13efae41028eddc5e2f0b831d05c2bcf678be0c7bcaf31a33b1d8407dd16f75d46ca83b7eb7fba861da8302272ed656a9649a176a9a4fc97ad

    • SSDEEP

      6144:7N+WWT7KBcxpMr4x0H9hOReN1Y3z1NCEAhMjWQANf9yUwlKt2LTfz:7N+WWT2Bi2rqWGNCiSf9Y023z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks