General

  • Target

    d9b50f69274ac3bfbd91fa1db68b247ec6bd98d34398cc5bf292931efca603b5

  • Size

    430KB

  • Sample

    230402-b2f3ksfc7s

  • MD5

    c612eb41d82a6036d9e9986c17e09c36

  • SHA1

    9aa2083cfd833c31eab0977c9479d483237206fc

  • SHA256

    d9b50f69274ac3bfbd91fa1db68b247ec6bd98d34398cc5bf292931efca603b5

  • SHA512

    cb62f15c965fdc3127d0e78c591c8e31fe0904a3d4d1195d98ff289b036971698c40cf8336dc8e0c8dcb621264f528cff1765a07225cc42734c5a7b6f8ab93e9

  • SSDEEP

    6144:QtCsV9e7WiZZg4/WuNrdfZtNtZu4CW5Kxqz7hbi:QQsV9e735NztNt0E5KxqM

Malware Config

Extracted

Family

redline

Botnet

@chicago

C2

185.11.61.125:22344

Attributes
  • auth_value

    21f863e0cbd09d0681058e068d0d1d7f

Targets

    • Target

      d9b50f69274ac3bfbd91fa1db68b247ec6bd98d34398cc5bf292931efca603b5

    • Size

      430KB

    • MD5

      c612eb41d82a6036d9e9986c17e09c36

    • SHA1

      9aa2083cfd833c31eab0977c9479d483237206fc

    • SHA256

      d9b50f69274ac3bfbd91fa1db68b247ec6bd98d34398cc5bf292931efca603b5

    • SHA512

      cb62f15c965fdc3127d0e78c591c8e31fe0904a3d4d1195d98ff289b036971698c40cf8336dc8e0c8dcb621264f528cff1765a07225cc42734c5a7b6f8ab93e9

    • SSDEEP

      6144:QtCsV9e7WiZZg4/WuNrdfZtNtZu4CW5Kxqz7hbi:QQsV9e735NztNt0E5KxqM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks