General

  • Target

    5ca07f7037dd3ebde27b1b3e8081462372c7e307d623c85228997e1f04f13f60

  • Size

    290KB

  • Sample

    230403-x8flaaae6t

  • MD5

    097e3f2a94eb51f4e7a9f303795a1dbe

  • SHA1

    6e8aefd3dba9792a3d2f63d717e0c6cc9bd35927

  • SHA256

    5ca07f7037dd3ebde27b1b3e8081462372c7e307d623c85228997e1f04f13f60

  • SHA512

    7c537a80acb33a7457df2673d4964f580ddd8a81c457079dee6855f0237071dedab061d086a7f2123747ea3595c2307afb217975f0f61e3b99310999ba66fad4

  • SSDEEP

    6144:Nqkw2R7u/jGs2PGf1jLNoAlpmYDC1FeJuYtHOuj:MfjGnOfjoyEYDKF0u7uj

Malware Config

Extracted

Family

redline

Botnet

@chicago

C2

185.11.61.125:22344

Attributes
  • auth_value

    21f863e0cbd09d0681058e068d0d1d7f

Targets

    • Target

      5ca07f7037dd3ebde27b1b3e8081462372c7e307d623c85228997e1f04f13f60

    • Size

      290KB

    • MD5

      097e3f2a94eb51f4e7a9f303795a1dbe

    • SHA1

      6e8aefd3dba9792a3d2f63d717e0c6cc9bd35927

    • SHA256

      5ca07f7037dd3ebde27b1b3e8081462372c7e307d623c85228997e1f04f13f60

    • SHA512

      7c537a80acb33a7457df2673d4964f580ddd8a81c457079dee6855f0237071dedab061d086a7f2123747ea3595c2307afb217975f0f61e3b99310999ba66fad4

    • SSDEEP

      6144:Nqkw2R7u/jGs2PGf1jLNoAlpmYDC1FeJuYtHOuj:MfjGnOfjoyEYDKF0u7uj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks