General

  • Target

    f2b3c3105f150c2eb17d06da4f2909277221a1f0f6b7d2a4690b1ca142a0da04

  • Size

    361KB

  • Sample

    230327-s4m3caeb27

  • MD5

    5a6fd1e9d0f80f6e1bedf85e9600b7fa

  • SHA1

    8d70d22d06f4ac042786fe94ec0db9f9094b3571

  • SHA256

    f2b3c3105f150c2eb17d06da4f2909277221a1f0f6b7d2a4690b1ca142a0da04

  • SHA512

    8f9819ab4811142fcc7a247bdfe521f644d2fe312f3cc2f162ca7ba57ab2ab797bed82c24bf7d68011aaf4b4801d17c2d85f53b4d60f7ab346a12b7d8009babb

  • SSDEEP

    6144:0+hvG1DoLy8PX7ZuB+/C+/lZuJoBpeG/20WPkPBeA0Rj+OTje1B+:FQ1DoOEX7sBf+/coBpX/2fPk8hB9TjeD

Malware Config

Extracted

Family

redline

Botnet

koreamon

C2

koreamonitoring.com:80

Attributes
  • auth_value

    1a0e1a9f491ef3df873a03577dfa10aa

Targets

    • Target

      f2b3c3105f150c2eb17d06da4f2909277221a1f0f6b7d2a4690b1ca142a0da04

    • Size

      361KB

    • MD5

      5a6fd1e9d0f80f6e1bedf85e9600b7fa

    • SHA1

      8d70d22d06f4ac042786fe94ec0db9f9094b3571

    • SHA256

      f2b3c3105f150c2eb17d06da4f2909277221a1f0f6b7d2a4690b1ca142a0da04

    • SHA512

      8f9819ab4811142fcc7a247bdfe521f644d2fe312f3cc2f162ca7ba57ab2ab797bed82c24bf7d68011aaf4b4801d17c2d85f53b4d60f7ab346a12b7d8009babb

    • SSDEEP

      6144:0+hvG1DoLy8PX7ZuB+/C+/lZuJoBpeG/20WPkPBeA0Rj+OTje1B+:FQ1DoOEX7sBf+/coBpX/2fPk8hB9TjeD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks