General

  • Target

    56046f1a5d086b8b0bf8a9ee523f4bb3662b79f2e574266c3dff084075479d57

  • Size

    346KB

  • Sample

    230327-r2r3vadh64

  • MD5

    209a038e66043e5a6b5e74e9b9ba6bc8

  • SHA1

    9addbdaba344fbbec6548981bfdca20c56b73886

  • SHA256

    56046f1a5d086b8b0bf8a9ee523f4bb3662b79f2e574266c3dff084075479d57

  • SHA512

    90a174baac7490934abcc4a900ca065bc6a37b62c2a09835ded67df820018e3faaa0e0d6efaf2a572f22ceb1bf5b14be14bfa3961b226d15bebf071e53ecf182

  • SSDEEP

    6144:rCWLqIhTPL6R89Kk0gysRYqpqpQ4zfYI2q0LyHKsEb4IHkVA9U:On0TPORjk0gysRYw+u4IEi9

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      56046f1a5d086b8b0bf8a9ee523f4bb3662b79f2e574266c3dff084075479d57

    • Size

      346KB

    • MD5

      209a038e66043e5a6b5e74e9b9ba6bc8

    • SHA1

      9addbdaba344fbbec6548981bfdca20c56b73886

    • SHA256

      56046f1a5d086b8b0bf8a9ee523f4bb3662b79f2e574266c3dff084075479d57

    • SHA512

      90a174baac7490934abcc4a900ca065bc6a37b62c2a09835ded67df820018e3faaa0e0d6efaf2a572f22ceb1bf5b14be14bfa3961b226d15bebf071e53ecf182

    • SSDEEP

      6144:rCWLqIhTPL6R89Kk0gysRYqpqpQ4zfYI2q0LyHKsEb4IHkVA9U:On0TPORjk0gysRYw+u4IEi9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks