General

  • Target

    c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98

  • Size

    346KB

  • Sample

    230328-a2kkbshh61

  • MD5

    eb298436f35ffbfa16a7a8b24c43212b

  • SHA1

    2bca91453ef12a285d450db7161296685a44aa14

  • SHA256

    c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98

  • SHA512

    6b52ce1248f5ca5d68f0e68ca79624c1f2ea5d2b4f4681de47bdfe8eab9e824cc8e0c5c7ac97c05d47bc2f1bc10252920bf9e2e447d829cc2190c5d0654c6fa9

  • SSDEEP

    6144:eOyp+TLzgxbLPE23Yp8QwOOwMPg0CQBCBc8ezlH:rFTngxbgIfXL/YJQBIez

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98

    • Size

      346KB

    • MD5

      eb298436f35ffbfa16a7a8b24c43212b

    • SHA1

      2bca91453ef12a285d450db7161296685a44aa14

    • SHA256

      c0b2b1fa89ee6e4cc91ebe5c362763a0bd77fe2385e85b4192cda93203e61a98

    • SHA512

      6b52ce1248f5ca5d68f0e68ca79624c1f2ea5d2b4f4681de47bdfe8eab9e824cc8e0c5c7ac97c05d47bc2f1bc10252920bf9e2e447d829cc2190c5d0654c6fa9

    • SSDEEP

      6144:eOyp+TLzgxbLPE23Yp8QwOOwMPg0CQBCBc8ezlH:rFTngxbgIfXL/YJQBIez

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks