General

  • Target

    c5e7b8cc508292f2dc7a9e3061c322f8dbd05f0c5f3118326ac4b3e09bc06202.zip

  • Size

    51KB

  • Sample

    230329-m1skrshe71

  • MD5

    8e3d900b3712d09909c33543547c284c

  • SHA1

    c2f23811801e32242efc366dd7a36a46e84bfa7d

  • SHA256

    ea7a1a76bfa12a75e2406c896fea09905f42ce3bbf1b18670aa093ee632c607e

  • SHA512

    8f74968edcfe93dc41f7e7acdad28f97bff9962f56d6e11670f39caee5a5def3dceac67abafc5f58ec511be0bb406c43bb8a79021146761d032d7f2577af77aa

  • SSDEEP

    1536:pouPTlWk9khAqTlF+wBqIKnRF/crbTIxD:p3PJWkq5JF+wIL0rbGD

Malware Config

Extracted

Family

redline

Botnet

nado

C2

176.113.115.145:4125

Attributes
  • auth_value

    a648e365d8e0df895a84152ad68ffc56

Targets

    • Target

      c5e7b8cc508292f2dc7a9e3061c322f8dbd05f0c5f3118326ac4b3e09bc06202

    • Size

      175KB

    • MD5

      b6c58e654bd7e1f22e4c3965375c15cb

    • SHA1

      ac1a61be5fc3e507cd7a20932722a7e37dcd99fa

    • SHA256

      c5e7b8cc508292f2dc7a9e3061c322f8dbd05f0c5f3118326ac4b3e09bc06202

    • SHA512

      c8b0a7dc27b7de064e4eeecfafbda8a17658d462e5e7217d6cc10db590943fcf0634419bc948278de6d51615eff82e3263ccecd7251af3500042e77514e15256

    • SSDEEP

      3072:yxqZWFFa7E6T825De559yhGfxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+cO:gqZcMUyh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks