General

  • Target

    be86fbd42fce70e24db66728d0a1bf00.exe

  • Size

    168KB

  • Sample

    230508-fa4f1sag9s

  • MD5

    be86fbd42fce70e24db66728d0a1bf00

  • SHA1

    a45657424acc53aa2ce6c13cf7bed7e98711a401

  • SHA256

    8ce111dc6707a72e8e6c27b21c23c5daf52056b149c71f3bd6ee10da957339ec

  • SHA512

    8eea240f29bad1926956de574d027e5fe17169834a2acd6b498efe0dcdb68218bf95a218d10e1e87e67603207d2d274127d5a116d2eed2bdc2647c6b22f2da13

  • SSDEEP

    1536:wMnuIYfFJ8EqlVZRGW+QOrpmTamjpv0ApyTGqVwbu0HlHGUyGnJ+83wYkg8e8hM:eZfYgfm9dVHqVAJmUyGnJ+W8e8hM

Malware Config

Extracted

Family

redline

Botnet

NewLife

C2

77.232.38.234:36987

Attributes
  • auth_value

    15969bf8f24a40fae2790c584eabb391

Targets

    • Target

      be86fbd42fce70e24db66728d0a1bf00.exe

    • Size

      168KB

    • MD5

      be86fbd42fce70e24db66728d0a1bf00

    • SHA1

      a45657424acc53aa2ce6c13cf7bed7e98711a401

    • SHA256

      8ce111dc6707a72e8e6c27b21c23c5daf52056b149c71f3bd6ee10da957339ec

    • SHA512

      8eea240f29bad1926956de574d027e5fe17169834a2acd6b498efe0dcdb68218bf95a218d10e1e87e67603207d2d274127d5a116d2eed2bdc2647c6b22f2da13

    • SSDEEP

      1536:wMnuIYfFJ8EqlVZRGW+QOrpmTamjpv0ApyTGqVwbu0HlHGUyGnJ+83wYkg8e8hM:eZfYgfm9dVHqVAJmUyGnJ+W8e8hM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks