General

  • Target

    1079b345363b9f3b668760a5841521d86a479ec81f0cdb33a90e78a56b71eff8

  • Size

    363KB

  • Sample

    230327-wy896sgg4w

  • MD5

    1a64ade5e998cb7b0fe4f1a098a207ba

  • SHA1

    b8a4ea255f085c689e6c3c6e5e6bbfe7fab6035f

  • SHA256

    1079b345363b9f3b668760a5841521d86a479ec81f0cdb33a90e78a56b71eff8

  • SHA512

    f5b8b813d5da2e0beb3ccfad4d5cfc3ac63019414c529f49b44ab2dc390baf96880304a88fc94a33beba4ac002b0381618629856d1e54c54a174109a1484685b

  • SSDEEP

    6144:qahdDXT8LUH9lIFvoxdJ4yu0ap3Kn2/XZ800B58DyfllhwMVp:nT8wXHdTCp6n2xT0fa4lh

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      1079b345363b9f3b668760a5841521d86a479ec81f0cdb33a90e78a56b71eff8

    • Size

      363KB

    • MD5

      1a64ade5e998cb7b0fe4f1a098a207ba

    • SHA1

      b8a4ea255f085c689e6c3c6e5e6bbfe7fab6035f

    • SHA256

      1079b345363b9f3b668760a5841521d86a479ec81f0cdb33a90e78a56b71eff8

    • SHA512

      f5b8b813d5da2e0beb3ccfad4d5cfc3ac63019414c529f49b44ab2dc390baf96880304a88fc94a33beba4ac002b0381618629856d1e54c54a174109a1484685b

    • SSDEEP

      6144:qahdDXT8LUH9lIFvoxdJ4yu0ap3Kn2/XZ800B58DyfllhwMVp:nT8wXHdTCp6n2xT0fa4lh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks