General

  • Target

    tmp

  • Size

    168KB

  • Sample

    230411-sm7qeseh4s

  • MD5

    03728fed675bcde5256342183b1d6f27

  • SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

  • SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

  • SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • SSDEEP

    1536:AGwZMqlVZRGWat1rYol4k9GLr6ICTGqVKbuNiYfHk4Lq83wYk78e8h7:A7YIocLWI3qV+beHk4Lq58e8h7

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      tmp

    • Size

      168KB

    • MD5

      03728fed675bcde5256342183b1d6f27

    • SHA1

      d13eace7d3d92f93756504b274777cc269b222a2

    • SHA256

      f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    • SHA512

      6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

    • SSDEEP

      1536:AGwZMqlVZRGWat1rYol4k9GLr6ICTGqVKbuNiYfHk4Lq83wYk78e8h7:A7YIocLWI3qV+beHk4Lq58e8h7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks