General

  • Target

    1b091d568b361f576ba2af84a4578f1d.bin

  • Size

    272KB

  • Sample

    230326-bg7pssgh9w

  • MD5

    889e4733ce5cf7e75de9de9517167600

  • SHA1

    a64980809caedbaf2a86bfe3f7938f51150cbe49

  • SHA256

    be41b8c5a4f06892e49b7e5836f486aacf2e626870fe6ef7bf542ed2bbd3b669

  • SHA512

    7c602a04f8cadd28016a4323cfa5a2b3763a690bff9bff82725b276c3c000e805d8290ded17e7f160e8cb7787d88b3030a33161fc707690a1854bd761533e1c0

  • SSDEEP

    6144:YD6gtPe78v5mgNReqB0AipNvLYaf3p54HMNv:YttPU8v5/NReMiXDfZ5Vv

Malware Config

Extracted

Family

redline

Botnet

@chicago

C2

185.11.61.125:22344

Attributes
  • auth_value

    21f863e0cbd09d0681058e068d0d1d7f

Targets

    • Target

      5ecb8f54488ba74740c4523adc1cfa1529f96ab09fa0e8e3fe13ae629653167c.exe

    • Size

      382KB

    • MD5

      1b091d568b361f576ba2af84a4578f1d

    • SHA1

      daee19301b2a6cacabf1a243f95305e8d5d61fb3

    • SHA256

      5ecb8f54488ba74740c4523adc1cfa1529f96ab09fa0e8e3fe13ae629653167c

    • SHA512

      cf32b9b036cb6f5e4d281141283caee4e4c1d335fca56490ce39d4e17b2f81a996714060dacfc1865dece7217fd11e534469f7bf16b6a871646cb77d338edd7e

    • SSDEEP

      6144:0kfMT6XyZT50aTAFbONcD1VXrSh7U1hLpkosTXzfZZmLpe4Wva:VfMT6CZTOaTA1ONcxJs7U1Rp3UXzR4t/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks