General

  • Target

    0fd6abe16eb10c511c44e453b357092c.exe

  • Size

    168KB

  • Sample

    230420-v6j5ksbd56

  • MD5

    0fd6abe16eb10c511c44e453b357092c

  • SHA1

    62157973b0ca72f69cfe0fe29af26b66e49fc6d3

  • SHA256

    16a6161a7efab534489a56476cf707a3ceffde375993f7991e23865ad7a6f706

  • SHA512

    90c4f20bb9fef6b63ff8b7e8115aa11e737a617575263fc7e71d8a228072b805d6814d4ef840f2ffec2846cbc322dd5a57bd9cf70b47f90e13c141c0e33fc4e0

  • SSDEEP

    1536:VLNTK6nNqlVZRGWhQureIh+xN7COTGqVsbuTESRsATTV83wYk88e8hX:VhTbnmIIG+rqVkKtR9TTV28e8hX

Malware Config

Extracted

Family

redline

Botnet

D2P new

C2

45.32.29.148:34824

Attributes
  • auth_value

    fa80dd4dc7193557e96cfffdcc2cfbd1

Targets

    • Target

      0fd6abe16eb10c511c44e453b357092c.exe

    • Size

      168KB

    • MD5

      0fd6abe16eb10c511c44e453b357092c

    • SHA1

      62157973b0ca72f69cfe0fe29af26b66e49fc6d3

    • SHA256

      16a6161a7efab534489a56476cf707a3ceffde375993f7991e23865ad7a6f706

    • SHA512

      90c4f20bb9fef6b63ff8b7e8115aa11e737a617575263fc7e71d8a228072b805d6814d4ef840f2ffec2846cbc322dd5a57bd9cf70b47f90e13c141c0e33fc4e0

    • SSDEEP

      1536:VLNTK6nNqlVZRGWhQureIh+xN7COTGqVsbuTESRsATTV83wYk88e8hX:VhTbnmIIG+rqVkKtR9TTV28e8hX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks