General

  • Target

    5ba09efaf6982d72a30b503fd14668c63093e86bb62b2e7dead99f88ccba27eb

  • Size

    348KB

  • Sample

    230403-dx6tjsce56

  • MD5

    2d839d1ccd9d335ae36de51f3dddf670

  • SHA1

    cd4762cb32e81707140ac306030e86e49493a645

  • SHA256

    5ba09efaf6982d72a30b503fd14668c63093e86bb62b2e7dead99f88ccba27eb

  • SHA512

    b8396d635ae74792366bda42d76bc0c237fc3ef8b18cf1390f38bd437fc4aa15da668cc17f9bb8f073b807f32b4b75124b1b4724a9e691f017a7e326181424d5

  • SSDEEP

    6144:tD1hDznmXc8qxtG1EKR2RkAO1lPnAmgTjZtkjt:tphXnmXc8WwR1x1l/AmgPGt

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      5ba09efaf6982d72a30b503fd14668c63093e86bb62b2e7dead99f88ccba27eb

    • Size

      348KB

    • MD5

      2d839d1ccd9d335ae36de51f3dddf670

    • SHA1

      cd4762cb32e81707140ac306030e86e49493a645

    • SHA256

      5ba09efaf6982d72a30b503fd14668c63093e86bb62b2e7dead99f88ccba27eb

    • SHA512

      b8396d635ae74792366bda42d76bc0c237fc3ef8b18cf1390f38bd437fc4aa15da668cc17f9bb8f073b807f32b4b75124b1b4724a9e691f017a7e326181424d5

    • SSDEEP

      6144:tD1hDznmXc8qxtG1EKR2RkAO1lPnAmgTjZtkjt:tphXnmXc8WwR1x1l/AmgPGt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks