General

  • Target

    0f74adcc107b2670fcc0f9268ff1104dd93b6b4d0ec3ee0afea7e4ccf98236ee

  • Size

    356KB

  • Sample

    230331-2wrj8seb54

  • MD5

    b54843216e81d950b128c854b730ea31

  • SHA1

    48640d586498c6204615eb752ba4b1a58530d77f

  • SHA256

    0f74adcc107b2670fcc0f9268ff1104dd93b6b4d0ec3ee0afea7e4ccf98236ee

  • SHA512

    9038e693a7a91bf2fef983e4a6495d014896f0e564a64dbe35072b26d817df75f757f2641581f049ec53ff024be0a6fed1f18584d64587010c23aa13e9e5fc85

  • SSDEEP

    6144:SKwqmkwxyoIA+LxEc2LvbQmlqDqioQsnV:4qmkAyo3i5Abhb

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      0f74adcc107b2670fcc0f9268ff1104dd93b6b4d0ec3ee0afea7e4ccf98236ee

    • Size

      356KB

    • MD5

      b54843216e81d950b128c854b730ea31

    • SHA1

      48640d586498c6204615eb752ba4b1a58530d77f

    • SHA256

      0f74adcc107b2670fcc0f9268ff1104dd93b6b4d0ec3ee0afea7e4ccf98236ee

    • SHA512

      9038e693a7a91bf2fef983e4a6495d014896f0e564a64dbe35072b26d817df75f757f2641581f049ec53ff024be0a6fed1f18584d64587010c23aa13e9e5fc85

    • SSDEEP

      6144:SKwqmkwxyoIA+LxEc2LvbQmlqDqioQsnV:4qmkAyo3i5Abhb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks