General

  • Target

    704c2154afe1ea4a2247733a980e1695.bin

  • Size

    266KB

  • Sample

    230328-b3ssrsab7v

  • MD5

    6429174a2df8301a13e3ec31876e8054

  • SHA1

    5d079a5415710fb844403e939947074dd1c3f64b

  • SHA256

    2671f595bbbf5259c873307008a3e2ec0e3dfc8698efc7f7e4cb4ab15089d6bd

  • SHA512

    b26ed7741f8b6dc58ceef37fb00dc7f9039663054429d6a3c40fe531f4e19c32fa9b389c4f129985ffe414758356e0bfc0e15c6438a8118df7b2fd8631e4f1c0

  • SSDEEP

    6144:NxWaVy/yN7xXgqwapybsU4262AYS6R5Nd5ciobcOWzI:vu0xQqLpWsnbB2/diWzI

Malware Config

Extracted

Family

redline

Botnet

@chicago

C2

185.11.61.125:22344

Attributes
  • auth_value

    21f863e0cbd09d0681058e068d0d1d7f

Targets

    • Target

      a2703a938720483ba3ab69d8c271bb409266e2683fbd0124ac5b22704b49726f.exe

    • Size

      375KB

    • MD5

      704c2154afe1ea4a2247733a980e1695

    • SHA1

      4d31285a7f7a17109a74c6a590cd438e1e5080e7

    • SHA256

      a2703a938720483ba3ab69d8c271bb409266e2683fbd0124ac5b22704b49726f

    • SHA512

      d852a2129dbd71344d6696e6e102dea57b52023e31fb3e94c003a654534c4925b553c79d9bbd40f5343c017847f0af7502e4ceb2546faf0ad684c255e553aa79

    • SSDEEP

      6144:3bvbEgZ5oaZp5BO/jrhrCxq7yz8fQZgIWSsCz7eL:3TblZ59ZzBO/xrCRHU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks