General

  • Target

    c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173

  • Size

    327KB

  • Sample

    230327-wp25hagf71

  • MD5

    7ef86dfbf6033a6e09b2a1d39c9c1561

  • SHA1

    0c5b193712c9fe8951df26874f8b9db0897cf629

  • SHA256

    c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173

  • SHA512

    7f3e412e3b2a04010f93ba027abacc9556fad414c2348f007a216e47c0b0e003b462a74abfaf3bde04f8343526b88a06e129e8effddf1be94cabf1b78794efe8

  • SSDEEP

    6144:he0L/RjlltabCPRiJ94XB22Bzq6yIJ2U2i+w33TBjlLe:he0tpDa+Rib4XBd8IvAw3Fj

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173

    • Size

      327KB

    • MD5

      7ef86dfbf6033a6e09b2a1d39c9c1561

    • SHA1

      0c5b193712c9fe8951df26874f8b9db0897cf629

    • SHA256

      c160fbd3885980740579f14f6c0de5b844afe754f2e07a278c67537bb7284173

    • SHA512

      7f3e412e3b2a04010f93ba027abacc9556fad414c2348f007a216e47c0b0e003b462a74abfaf3bde04f8343526b88a06e129e8effddf1be94cabf1b78794efe8

    • SSDEEP

      6144:he0L/RjlltabCPRiJ94XB22Bzq6yIJ2U2i+w33TBjlLe:he0tpDa+Rib4XBd8IvAw3Fj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks