General

  • Target

    0x0008000000012317-109.dat

  • Size

    172KB

  • Sample

    230608-f89exscf39

  • MD5

    fdd8e15af06957d6bad05c026e7a7215

  • SHA1

    e0c707803580eef554077c992ec6276c8afd771c

  • SHA256

    375ae29e672f4adb7c735f321b4a5e9050dba4313023e7642a0dbfff6a714f3d

  • SHA512

    f1a552fc7372477e44e0e08206fdb924ea682a09f336753b6f450751b0b3e741a13ebd161180d01491c797ca8c70724539b5a6aaa94cec6171329b26a5522440

  • SSDEEP

    1536:gtaPgzl736sv0W7Tp8JFrH4ySLn1nbAxNTIYQ/dbumgzeFra6l0GkR88e8hZ:g6gJBO0y6RbAxNjgOqFra6l/8e8hZ

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      0x0008000000012317-109.dat

    • Size

      172KB

    • MD5

      fdd8e15af06957d6bad05c026e7a7215

    • SHA1

      e0c707803580eef554077c992ec6276c8afd771c

    • SHA256

      375ae29e672f4adb7c735f321b4a5e9050dba4313023e7642a0dbfff6a714f3d

    • SHA512

      f1a552fc7372477e44e0e08206fdb924ea682a09f336753b6f450751b0b3e741a13ebd161180d01491c797ca8c70724539b5a6aaa94cec6171329b26a5522440

    • SSDEEP

      1536:gtaPgzl736sv0W7Tp8JFrH4ySLn1nbAxNTIYQ/dbumgzeFra6l0GkR88e8hZ:g6gJBO0y6RbAxNjgOqFra6l/8e8hZ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks