General

  • Target

    1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8

  • Size

    354KB

  • Sample

    230327-p2yvaafe7x

  • MD5

    37bf44f8489e4594c538a363e83d876a

  • SHA1

    a72346b9a7dea9136ea020a3faae1aabe3e5fe9d

  • SHA256

    1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8

  • SHA512

    24b2c78dfe4f16aaa06773c7a4920c7243dc5e07ef87ba31cb04bdb03f0d14f457d0c2de14c92b4f593f82761c0f2433b1d98f0090fae799ff6f33eb8d2b114f

  • SSDEEP

    6144:W/BdyBWD1LofPX2ijCeM2cp8OQyqM753pczq3XjcoZpLZbkWbzxjw:g6WD1EfPGijfCHqM75mcXYK1bkWi

Malware Config

Extracted

Family

redline

Botnet

koreamon

C2

koreamonitoring.com:80

Attributes
  • auth_value

    1a0e1a9f491ef3df873a03577dfa10aa

Targets

    • Target

      1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8

    • Size

      354KB

    • MD5

      37bf44f8489e4594c538a363e83d876a

    • SHA1

      a72346b9a7dea9136ea020a3faae1aabe3e5fe9d

    • SHA256

      1727a7e036ec6a5e886989da26104c203f1eec85aaae144fc9b4865dd58eb9e8

    • SHA512

      24b2c78dfe4f16aaa06773c7a4920c7243dc5e07ef87ba31cb04bdb03f0d14f457d0c2de14c92b4f593f82761c0f2433b1d98f0090fae799ff6f33eb8d2b114f

    • SSDEEP

      6144:W/BdyBWD1LofPX2ijCeM2cp8OQyqM753pczq3XjcoZpLZbkWbzxjw:g6WD1EfPGijfCHqM75mcXYK1bkWi

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks