General

  • Target

    d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409

  • Size

    376KB

  • Sample

    230328-jt7jkahg28

  • MD5

    087bf72cccfd8c865940dc6a51284828

  • SHA1

    609b83cd903bc345801d8a86d5d74d828e79c239

  • SHA256

    d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409

  • SHA512

    0841ad16510c9f5c3740232daab1ef643e7438f203bb225e24a33378bfd24a20b011a784817674f4173b3e6446c86c2e41b31a33830b05ca95186ee150b9fb49

  • SSDEEP

    6144:9VIs9M/TWoX5cMe4tpd8QBDEFCixXB/xmuaUno9ATSb6a:9VIs9MrWuQ4tj8Q2Zxx/xmB6No

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409

    • Size

      376KB

    • MD5

      087bf72cccfd8c865940dc6a51284828

    • SHA1

      609b83cd903bc345801d8a86d5d74d828e79c239

    • SHA256

      d31c6bb462d823c9308a16fcf6842cf39d68406e9701081fdd869a1f69ae4409

    • SHA512

      0841ad16510c9f5c3740232daab1ef643e7438f203bb225e24a33378bfd24a20b011a784817674f4173b3e6446c86c2e41b31a33830b05ca95186ee150b9fb49

    • SSDEEP

      6144:9VIs9M/TWoX5cMe4tpd8QBDEFCixXB/xmuaUno9ATSb6a:9VIs9MrWuQ4tj8Q2Zxx/xmB6No

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks