General

  • Target

    abc774dc79ecf5feef36463d5fc949a6dc71ee4afd9881d52a6b932caaa10405.zip

  • Size

    51KB

  • Sample

    230329-tyflraha72

  • MD5

    bb3f3a586c0d6393e60d8ba87cd5bf4e

  • SHA1

    c531482576a5e802a834e1bb89302d60d9c6d190

  • SHA256

    458d78ea7790daec55d645891988ae8bbe2ced459baebb9130949d54cc8fd232

  • SHA512

    08265cb0d2ac08130eafbfc69b62ea424b6e897d21f170576f845cc67b5a88220102af29c0521ac5f3a172eb33b952ef2029880e714f6dae29f1b20e0717ef7c

  • SSDEEP

    1536:dByuzr/ZantEidwbWUxqB7bBtidOVEO5eZsTugrEr:dT8tEidvtBUsic4CPrEr

Malware Config

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Targets

    • Target

      abc774dc79ecf5feef36463d5fc949a6dc71ee4afd9881d52a6b932caaa10405

    • Size

      175KB

    • MD5

      9ab212e7bfa3bb63d572ef4310a3f7fe

    • SHA1

      c11ad9e8ccbd36360e5f6ce68ad32d2d2a27cf72

    • SHA256

      abc774dc79ecf5feef36463d5fc949a6dc71ee4afd9881d52a6b932caaa10405

    • SHA512

      3aabeabc562a0a6a8f65c3b8def5ba19d2808e2910b77fe23fa88012f8dac2600dc434b6998b411977bab25518cfc62d3f6b7de52042a0dad4c8e099a10c9693

    • SSDEEP

      3072:VxqZWn7aNQYF8ZueD59IhmHxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+caq:fqZuZZIh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks