General

  • Target

    41ad4bf3ca240bc694945bd2688e8f766376e15591c3d0ea757b186e5a5abe09

  • Size

    363KB

  • Sample

    230327-tcwe3sgc3z

  • MD5

    eda5c72301507b3adf08a64b86b7d78f

  • SHA1

    a066ec770ed8ac4ddd58e438a4dfe87b3acaf60b

  • SHA256

    41ad4bf3ca240bc694945bd2688e8f766376e15591c3d0ea757b186e5a5abe09

  • SHA512

    12953db1f6783ee9f4d36d1bacb8fd9828c4465084112546fe43231d0bcf6683f00c5bb0a0dbf576bb6368f30dcd3152b1f7a3d3d9e81ffb4eb37732947a3902

  • SSDEEP

    6144:ntSwSeeTrLly99tUFBzkjEYw/SdadcrYRRIeROcQx9Mut2en8YK:tU1TrRa+By2SdBrLeR1/

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      41ad4bf3ca240bc694945bd2688e8f766376e15591c3d0ea757b186e5a5abe09

    • Size

      363KB

    • MD5

      eda5c72301507b3adf08a64b86b7d78f

    • SHA1

      a066ec770ed8ac4ddd58e438a4dfe87b3acaf60b

    • SHA256

      41ad4bf3ca240bc694945bd2688e8f766376e15591c3d0ea757b186e5a5abe09

    • SHA512

      12953db1f6783ee9f4d36d1bacb8fd9828c4465084112546fe43231d0bcf6683f00c5bb0a0dbf576bb6368f30dcd3152b1f7a3d3d9e81ffb4eb37732947a3902

    • SSDEEP

      6144:ntSwSeeTrLly99tUFBzkjEYw/SdadcrYRRIeROcQx9Mut2en8YK:tU1TrRa+By2SdBrLeR1/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks