General

  • Target

    ea730bb8cd900bf562078af2698931770f29987bfa718f2b80bcbc9095c16cb8

  • Size

    401KB

  • Sample

    230328-npzqdaaf97

  • MD5

    5947a36d07451c905428928ec225ab5b

  • SHA1

    36a24badbe45f1cb73c7b86f2794ef0b159af174

  • SHA256

    ea730bb8cd900bf562078af2698931770f29987bfa718f2b80bcbc9095c16cb8

  • SHA512

    f570f237ea636dec8406e539d102f352e538577f91efb55b6db4d4c06fa97a29b1e9006e3dcf78e363775fb9307bd3713687b14dbe4a71c704ac561580f49f5c

  • SSDEEP

    6144:lG0ZLXpff70N4hQ8nP2h7/xkJSok9/gDbxYzhnGtDDTO:lG055X70WhQmP2h7/urklgv4szO

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      ea730bb8cd900bf562078af2698931770f29987bfa718f2b80bcbc9095c16cb8

    • Size

      401KB

    • MD5

      5947a36d07451c905428928ec225ab5b

    • SHA1

      36a24badbe45f1cb73c7b86f2794ef0b159af174

    • SHA256

      ea730bb8cd900bf562078af2698931770f29987bfa718f2b80bcbc9095c16cb8

    • SHA512

      f570f237ea636dec8406e539d102f352e538577f91efb55b6db4d4c06fa97a29b1e9006e3dcf78e363775fb9307bd3713687b14dbe4a71c704ac561580f49f5c

    • SSDEEP

      6144:lG0ZLXpff70N4hQ8nP2h7/xkJSok9/gDbxYzhnGtDDTO:lG055X70WhQmP2h7/urklgv4szO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks