General

  • Target

    83ef28ceb5b194ae29d882d2d5c7a1d66226b81fd6f28feed4d3700b3cf409e8.zip

  • Size

    51KB

  • Sample

    230328-m9wc1saf39

  • MD5

    fb9d56fbbbe4943937bb5153ac32a89a

  • SHA1

    3befe19bda986a59f6f8e33a4fbec63f5910359c

  • SHA256

    3f8c5a2779905b6fa0aa6a1d7d6766d8d923cb5ccea6300090d756dd12e56e91

  • SHA512

    955e26fa7e836dd5bf013c8c73f87b15089dd0ff0c90a2552a3187e7a78fd58983c48071d4fe172729fd1f8805034f4ffe401b279fb0d8ae4cfce2bfa26c1390

  • SSDEEP

    1536:QTU2C1KW+X1pX20w6Q7mwOxaurbncg+AU+s0jDbBc8t:QAr1R+l85U4urb3++DbBT

Malware Config

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Targets

    • Target

      83ef28ceb5b194ae29d882d2d5c7a1d66226b81fd6f28feed4d3700b3cf409e8

    • Size

      175KB

    • MD5

      e8525527be04d85f85708d58c38d096a

    • SHA1

      8a5d446912f9f8a8f8ec977d544a3e0e1c704c3d

    • SHA256

      83ef28ceb5b194ae29d882d2d5c7a1d66226b81fd6f28feed4d3700b3cf409e8

    • SHA512

      cd6e0a4ebcc3ea255caa0b8b536121de0f204f6fdb7f3a782a3f82a2da13d74175c220b6b047bfbee12960fd93646e41cee8e2d6ec86c7f110226cc68152c400

    • SSDEEP

      3072:jxqZWRZaPkOQ3TjmTseesFqh+XxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuwh:1qZoTjalqh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks