General

  • Target

    22b9d1e04bb0948879ecedc8f329b1af0d9dd42527eff3a36a15d1202a344179

  • Size

    351KB

  • Sample

    230401-1jf3asch58

  • MD5

    acb2927d5c18b6547f70bb7cbf5fc582

  • SHA1

    34bf99a410f1e4b5bc97c356d0ab5e2cd9343e63

  • SHA256

    22b9d1e04bb0948879ecedc8f329b1af0d9dd42527eff3a36a15d1202a344179

  • SHA512

    472e7071b60e863bdef2820d21c500678b5a7ded4e9678f9497cbd3ec8e8a253e81629f38136a44a4a5bf99bb44bf96dd01a063f26c99f6a635e7d8a565d397f

  • SSDEEP

    6144:oV94Dc2FE5ErEI5+kzuH7DIPaYCr9xDcqlb6:e94DF1rVeHoO5x3Q

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      22b9d1e04bb0948879ecedc8f329b1af0d9dd42527eff3a36a15d1202a344179

    • Size

      351KB

    • MD5

      acb2927d5c18b6547f70bb7cbf5fc582

    • SHA1

      34bf99a410f1e4b5bc97c356d0ab5e2cd9343e63

    • SHA256

      22b9d1e04bb0948879ecedc8f329b1af0d9dd42527eff3a36a15d1202a344179

    • SHA512

      472e7071b60e863bdef2820d21c500678b5a7ded4e9678f9497cbd3ec8e8a253e81629f38136a44a4a5bf99bb44bf96dd01a063f26c99f6a635e7d8a565d397f

    • SSDEEP

      6144:oV94Dc2FE5ErEI5+kzuH7DIPaYCr9xDcqlb6:e94DF1rVeHoO5x3Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks