General

  • Target

    2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7.zip

  • Size

    51KB

  • Sample

    230328-nz1enaag72

  • MD5

    663fa2d366f99cc0962011e46ab45cb7

  • SHA1

    a482099d3edcfb9914c092e92c74b54a7a3d0b14

  • SHA256

    04c6a3f5a861b50425032f34ddc7f73c893113f681563c3b75b7576f6774bf72

  • SHA512

    47df0780cb61253bf4e3f3008eb46bfad8085c28434891d80a883847a2645dd8d2a5246f83e1e24c384da5ad42f2bb250450838cc08280a9a3f4d1b3e0eaf22b

  • SSDEEP

    1536:9zqji9WNuVHbtJMvGvdrLg8i9jzrY/GsyWc4+T:9zZ6udbtJMGN3i9PvjhT

Malware Config

Extracted

Family

redline

Botnet

luza

C2

176.113.115.145:4125

Attributes
  • auth_value

    1261701914d508e02e8b4f25d38bc7f9

Targets

    • Target

      2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7

    • Size

      175KB

    • MD5

      438274becd1d693975e568caf19734a9

    • SHA1

      0538421a4739a043d045e34f5ae89189d0db4e63

    • SHA256

      2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7

    • SHA512

      6cd0653f9f9a8efc04afdfd73ab1fece3684a4a6a93a4a74abda685dd2a18ed3db195ecfa35e33455204af3321bd293e50d28a26c0634a6e20dadfba8228bb56

    • SSDEEP

      3072:kxqZWZRanU2n0YLxE3I4Ge/N9PhhPxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jr:6qZgYLx+r5Ph

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks