General

  • Target

    f852c8c496fd9adac5775547168da5304d9097789aa694694afc2e88e5188f8b

  • Size

    313KB

  • Sample

    230331-r8sb7aag42

  • MD5

    dff4962a22c11337f55207c2e2108b5e

  • SHA1

    cdb02340a5c4ce16add2a2d1c1f4f78ff9b2d42a

  • SHA256

    f852c8c496fd9adac5775547168da5304d9097789aa694694afc2e88e5188f8b

  • SHA512

    ac45cd0c08623a437c1399e2352615879ac70e5d1ff484cba31e747c7ed2a5f39f6e3eb1bfb57faca33d53e8420c2b049d69c7b6d5ee5b3982c2e652cb952f5c

  • SSDEEP

    6144:HQYVz2Vl+txjIv0OSYIVvwGMn5S8qQ760NC/Zhb:1kfkdIvNXYvG5Wx0Nijb

Malware Config

Extracted

Family

redline

Botnet

frtrack

C2

francestracking.com:80

Attributes
  • auth_value

    f2f94b780071d26409283a3478312faf

Targets

    • Target

      f852c8c496fd9adac5775547168da5304d9097789aa694694afc2e88e5188f8b

    • Size

      313KB

    • MD5

      dff4962a22c11337f55207c2e2108b5e

    • SHA1

      cdb02340a5c4ce16add2a2d1c1f4f78ff9b2d42a

    • SHA256

      f852c8c496fd9adac5775547168da5304d9097789aa694694afc2e88e5188f8b

    • SHA512

      ac45cd0c08623a437c1399e2352615879ac70e5d1ff484cba31e747c7ed2a5f39f6e3eb1bfb57faca33d53e8420c2b049d69c7b6d5ee5b3982c2e652cb952f5c

    • SSDEEP

      6144:HQYVz2Vl+txjIv0OSYIVvwGMn5S8qQ760NC/Zhb:1kfkdIvNXYvG5Wx0Nijb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks