General

  • Target

    8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb

  • Size

    362KB

  • Sample

    230327-vshplaee23

  • MD5

    261dc582f719f9055c86dd1c748fe49a

  • SHA1

    604d5cb471e3cb27dacf9530cd8becb6343d0ca6

  • SHA256

    8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb

  • SHA512

    da05ffc5cf7d81c8c1eb54eebb53caa88294671ce9f391cf8990c996e4f7a286ba4c18b63fdcc81400a1da091cfbf448f907a25f729cdb005e09813d9114e942

  • SSDEEP

    6144:Wa4Av9+TdLE09xBDOHBOAvL/BXb9AG994VRWQwuC/:3HETdQQROH/lXxAG9WWQB

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb

    • Size

      362KB

    • MD5

      261dc582f719f9055c86dd1c748fe49a

    • SHA1

      604d5cb471e3cb27dacf9530cd8becb6343d0ca6

    • SHA256

      8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb

    • SHA512

      da05ffc5cf7d81c8c1eb54eebb53caa88294671ce9f391cf8990c996e4f7a286ba4c18b63fdcc81400a1da091cfbf448f907a25f729cdb005e09813d9114e942

    • SSDEEP

      6144:Wa4Av9+TdLE09xBDOHBOAvL/BXb9AG994VRWQwuC/:3HETdQQROH/lXxAG9WWQB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks