General

  • Target

    ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68

  • Size

    314KB

  • Sample

    230331-rbslpabb3v

  • MD5

    0ef6f7e1bd3cc28e0731eadb63c2ad25

  • SHA1

    f2bcafbd0a715bbf7d4cdeef4d2a14440ae9db36

  • SHA256

    ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68

  • SHA512

    2b0ef1fc5f3e75744de78b18963ce608a5ea5b5cb011be2bd419a446ce0af3941f7b75f82be74ac40b615f28ba07153d9bdd0aec5e936f87cf0f5cdcca3374be

  • SSDEEP

    6144:l2XgXI9u4OFT1DDA0qmyRn0c19fQbWeE4uhHe:u7uvFTZAxmI0cxeCH

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68

    • Size

      314KB

    • MD5

      0ef6f7e1bd3cc28e0731eadb63c2ad25

    • SHA1

      f2bcafbd0a715bbf7d4cdeef4d2a14440ae9db36

    • SHA256

      ed67a5c3add95dab9d499409ecc5c05b42a3c87bb9dde1045f9114d97b01bc68

    • SHA512

      2b0ef1fc5f3e75744de78b18963ce608a5ea5b5cb011be2bd419a446ce0af3941f7b75f82be74ac40b615f28ba07153d9bdd0aec5e936f87cf0f5cdcca3374be

    • SSDEEP

      6144:l2XgXI9u4OFT1DDA0qmyRn0c19fQbWeE4uhHe:u7uvFTZAxmI0cxeCH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks