General

  • Target

    92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e

  • Size

    349KB

  • Sample

    230403-cj1vpscc38

  • MD5

    b639bd399837f1e0c1424313f0f1a18e

  • SHA1

    a53c3f3b5480e89831d1a30793d8164993ab3a07

  • SHA256

    92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e

  • SHA512

    a8547cf231497b8ff89055aa8e1a76b21fb9b55d29ea0c68313579bee07cd7fbc625fd127de6f8dd3ef7221c174d2b409553f8e2c71ff62f840fe2018736d11b

  • SSDEEP

    6144:0bbh/s/Lo35Gj2ikE8eMMH3hvRmgcZYKlXpGg5HTSMJYBQj1m/1:2h/cM35GqHuhvRmFZYKRog5HTnJv1M1

Malware Config

Extracted

Family

redline

Botnet

1WEEK

C2

116.203.35.84:1417

Attributes
  • auth_value

    1ea1af49193699ff9d39f89add353566

Targets

    • Target

      92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e

    • Size

      349KB

    • MD5

      b639bd399837f1e0c1424313f0f1a18e

    • SHA1

      a53c3f3b5480e89831d1a30793d8164993ab3a07

    • SHA256

      92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e

    • SHA512

      a8547cf231497b8ff89055aa8e1a76b21fb9b55d29ea0c68313579bee07cd7fbc625fd127de6f8dd3ef7221c174d2b409553f8e2c71ff62f840fe2018736d11b

    • SSDEEP

      6144:0bbh/s/Lo35Gj2ikE8eMMH3hvRmgcZYKlXpGg5HTSMJYBQj1m/1:2h/cM35GqHuhvRmFZYKRog5HTnJv1M1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks