General

  • Target

    fa7c13b5ae4f944e0e226cc3de0ba02fa4ae4e8977be331f9b309ba3f9ca6f7b

  • Size

    361KB

  • Sample

    230327-zx5gdafc42

  • MD5

    1e86a9efd41921927ca1ac4a8250feab

  • SHA1

    e009d775428901727ec323d68734c3fa093ac31a

  • SHA256

    fa7c13b5ae4f944e0e226cc3de0ba02fa4ae4e8977be331f9b309ba3f9ca6f7b

  • SHA512

    9b7d389f53d85413d95ea9f16e0f9220b493129ae39d96f9929ada8bfada2100614807d071eb8ee0ee83d01f6bd114286f6ca4954d0d965623b1432d059ca8f8

  • SSDEEP

    6144:YlamNO1L0Pr9hUTdyw7GcokW3WnyCBpue6YV+acTyNo:ye1QProfKVxCykue6GRco

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      fa7c13b5ae4f944e0e226cc3de0ba02fa4ae4e8977be331f9b309ba3f9ca6f7b

    • Size

      361KB

    • MD5

      1e86a9efd41921927ca1ac4a8250feab

    • SHA1

      e009d775428901727ec323d68734c3fa093ac31a

    • SHA256

      fa7c13b5ae4f944e0e226cc3de0ba02fa4ae4e8977be331f9b309ba3f9ca6f7b

    • SHA512

      9b7d389f53d85413d95ea9f16e0f9220b493129ae39d96f9929ada8bfada2100614807d071eb8ee0ee83d01f6bd114286f6ca4954d0d965623b1432d059ca8f8

    • SSDEEP

      6144:YlamNO1L0Pr9hUTdyw7GcokW3WnyCBpue6YV+acTyNo:ye1QProfKVxCykue6GRco

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks