General

  • Target

    d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb

  • Size

    313KB

  • Sample

    230331-xsx6dscf74

  • MD5

    3faf2c23c82e2855758895ba3587a53a

  • SHA1

    27fd7616044af939a58c5175126bf544d4ed487b

  • SHA256

    d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb

  • SHA512

    e9a969462ed2a91f26bf1b2abf27a5fa8c116754224e5209032190bb44e4726e37083dc6bff20467f016998f8e4b7a1722ed0ac56790427d5f7adfb44aec8fd8

  • SSDEEP

    6144:UjVHgrVLPNg+K8inLgkFxXtON88eIE2EfW1sd:cRgrVLFgN8EvIVzE+K

Malware Config

Extracted

Family

redline

Botnet

frtrack

C2

francestracking.com:80

Attributes
  • auth_value

    f2f94b780071d26409283a3478312faf

Targets

    • Target

      d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb

    • Size

      313KB

    • MD5

      3faf2c23c82e2855758895ba3587a53a

    • SHA1

      27fd7616044af939a58c5175126bf544d4ed487b

    • SHA256

      d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb

    • SHA512

      e9a969462ed2a91f26bf1b2abf27a5fa8c116754224e5209032190bb44e4726e37083dc6bff20467f016998f8e4b7a1722ed0ac56790427d5f7adfb44aec8fd8

    • SSDEEP

      6144:UjVHgrVLPNg+K8inLgkFxXtON88eIE2EfW1sd:cRgrVLFgN8EvIVzE+K

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks