General

  • Target

    c3750bb1c161ff86f6c5cf35ff827fd8fc1000dfbdb9ff162a61463632d997cf

  • Size

    376KB

  • Sample

    230328-gscxfsba4z

  • MD5

    8c6fa09cadae7b0c3769d4072ad1f8ba

  • SHA1

    737413139bf9428c663ad9d15cef7520b2643aef

  • SHA256

    c3750bb1c161ff86f6c5cf35ff827fd8fc1000dfbdb9ff162a61463632d997cf

  • SHA512

    e969820187bb26e55f0f4f8a5acd19f0c7ecc76d29b429f0f854055bec0e9d87a3867fd1a763b5c169a7368626bcdd4206b96585bef12518b94771741ab146af

  • SSDEEP

    6144:0bS8e9r9P0RWQLfDqGR/+WwI1AxvAWHNzz1BHI80X:0bS8e9hP0UuDqGR/+W11AlFHNzx510X

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      c3750bb1c161ff86f6c5cf35ff827fd8fc1000dfbdb9ff162a61463632d997cf

    • Size

      376KB

    • MD5

      8c6fa09cadae7b0c3769d4072ad1f8ba

    • SHA1

      737413139bf9428c663ad9d15cef7520b2643aef

    • SHA256

      c3750bb1c161ff86f6c5cf35ff827fd8fc1000dfbdb9ff162a61463632d997cf

    • SHA512

      e969820187bb26e55f0f4f8a5acd19f0c7ecc76d29b429f0f854055bec0e9d87a3867fd1a763b5c169a7368626bcdd4206b96585bef12518b94771741ab146af

    • SSDEEP

      6144:0bS8e9r9P0RWQLfDqGR/+WwI1AxvAWHNzz1BHI80X:0bS8e9hP0UuDqGR/+W11AlFHNzx510X

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks