General

  • Target

    60b551b59f5d0c545343a2e0505c7af90b213aa048773bc08cdefa1b05ed3063

  • Size

    361KB

  • Sample

    230327-xkyf7agh31

  • MD5

    446ba2accfb4e4a00ee05aba6ccaa121

  • SHA1

    85e277c01e372cb70f27cd4ce21b8ab1f2c5bd6f

  • SHA256

    60b551b59f5d0c545343a2e0505c7af90b213aa048773bc08cdefa1b05ed3063

  • SHA512

    7c4401beddc117751828e5c62ecc14e18f374885ac51f7a97141c3f6eb474ef6145342ede9357a641b4689203866974deab6a9e71a23a692763f081bb64e2174

  • SSDEEP

    6144:6lay6ONLUoC0YL2ERDNKu5u3Vy1mLdPfdjRnScrO:U1NwoC7LnDZJqdPJBm

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      60b551b59f5d0c545343a2e0505c7af90b213aa048773bc08cdefa1b05ed3063

    • Size

      361KB

    • MD5

      446ba2accfb4e4a00ee05aba6ccaa121

    • SHA1

      85e277c01e372cb70f27cd4ce21b8ab1f2c5bd6f

    • SHA256

      60b551b59f5d0c545343a2e0505c7af90b213aa048773bc08cdefa1b05ed3063

    • SHA512

      7c4401beddc117751828e5c62ecc14e18f374885ac51f7a97141c3f6eb474ef6145342ede9357a641b4689203866974deab6a9e71a23a692763f081bb64e2174

    • SSDEEP

      6144:6lay6ONLUoC0YL2ERDNKu5u3Vy1mLdPfdjRnScrO:U1NwoC7LnDZJqdPJBm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks