General

  • Target

    c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f

  • Size

    578KB

  • Sample

    230607-d5fmbsgg63

  • MD5

    432b19f49dd991ebb1feffa31cda8e31

  • SHA1

    6f2b316d662bdd9598294370d786fa0d4af65c18

  • SHA256

    c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f

  • SHA512

    7bef6cc3418fa9e4253fac30ff0839bd9edb662a0a94b9809db50f63071549f0670b969ca05af991d0cfae7b14036eb02a8c33aadbe151e6e6525119238250a2

  • SSDEEP

    12288:2Mr2y90TeUQjYTXahstEC3CI5BoA0OUelnbxzBCBNVdpjp:kyiQjhh+Pb5Botu99AV3p

Malware Config

Extracted

Family

redline

Botnet

dasa

C2

83.97.73.126:19048

Attributes
  • auth_value

    7eca6ed540c2dcd359aed5b67c4eda07

Targets

    • Target

      c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f

    • Size

      578KB

    • MD5

      432b19f49dd991ebb1feffa31cda8e31

    • SHA1

      6f2b316d662bdd9598294370d786fa0d4af65c18

    • SHA256

      c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f

    • SHA512

      7bef6cc3418fa9e4253fac30ff0839bd9edb662a0a94b9809db50f63071549f0670b969ca05af991d0cfae7b14036eb02a8c33aadbe151e6e6525119238250a2

    • SSDEEP

      12288:2Mr2y90TeUQjYTXahstEC3CI5BoA0OUelnbxzBCBNVdpjp:kyiQjhh+Pb5Botu99AV3p

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks