General

  • Target

    9ea1b30aa5a0454493960ef68689558e787a1dbc371d08c867d56ac18301152b.zip

  • Size

    51KB

  • Sample

    230328-l1rsssca71

  • MD5

    18e137cc5f2fa23aeb32a8e55820793a

  • SHA1

    82effb3209c961766b15b90ba406eddae9a8ae3e

  • SHA256

    7120d4b576e22cbf73721e7b4d1ff168465ca4c916037fd7e47fd2aa396c369c

  • SHA512

    94842a2a23c2928c550839082ffaa2a00bdb4bd92b8733f1258f750704117a52baa1b5e5ce1d70f462786fedf327d1aa866eca15cf6f248c0c9fe9dd1cd153a4

  • SSDEEP

    1536:mTU2C1KW+X1pX20w6Q7mwOxaurbncg+AU+s0jDbBc8S:mAr1R+l85U4urb3++DbBY

Malware Config

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Targets

    • Target

      9ea1b30aa5a0454493960ef68689558e787a1dbc371d08c867d56ac18301152b

    • Size

      175KB

    • MD5

      bbc890a7bbc80a0fb37afa5d04bc06d2

    • SHA1

      511456d3c638bd83ab72a814822b25363c0801be

    • SHA256

      9ea1b30aa5a0454493960ef68689558e787a1dbc371d08c867d56ac18301152b

    • SHA512

      e4e327a4c663aa815c6513754776ee7e9f07fb08001e24f40e2698f0bc6c62cc16e62971566c1bac823f3b300a4133c57959e68ba002da365d4415998bfa3a52

    • SSDEEP

      3072:jxqZWRZaPkOQ3TjmTseesFqh+XxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuwh:1qZoTjalqh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks