General

  • Target

    f32fc7890fba594015fde909e73433629eb9453c194116f43b1d22b93d9d5dbd

  • Size

    313KB

  • Sample

    230331-yc6m9sch36

  • MD5

    f841c004c81997177a2dad32872efe57

  • SHA1

    cdb04fa3aeebdd6974c9c7e44b4d7049bc2f485b

  • SHA256

    f32fc7890fba594015fde909e73433629eb9453c194116f43b1d22b93d9d5dbd

  • SHA512

    cfb1a7a7d694ae27d9c022ec055fe1c1555e2cd8ef04689e366667b700992da925ce718e3187204fd1c71f84a4dc146c09a72d03e862d9073802a92326a526da

  • SSDEEP

    6144:pZF/7aTGq8WXup/b5WSzPI+/4OczzGSP:rFOTGTWXudNw+gOYi

Malware Config

Extracted

Family

redline

Botnet

frtrack

C2

francestracking.com:80

Attributes
  • auth_value

    f2f94b780071d26409283a3478312faf

Targets

    • Target

      f32fc7890fba594015fde909e73433629eb9453c194116f43b1d22b93d9d5dbd

    • Size

      313KB

    • MD5

      f841c004c81997177a2dad32872efe57

    • SHA1

      cdb04fa3aeebdd6974c9c7e44b4d7049bc2f485b

    • SHA256

      f32fc7890fba594015fde909e73433629eb9453c194116f43b1d22b93d9d5dbd

    • SHA512

      cfb1a7a7d694ae27d9c022ec055fe1c1555e2cd8ef04689e366667b700992da925ce718e3187204fd1c71f84a4dc146c09a72d03e862d9073802a92326a526da

    • SSDEEP

      6144:pZF/7aTGq8WXup/b5WSzPI+/4OczzGSP:rFOTGTWXudNw+gOYi

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks