General

  • Target

    06546799.dat

  • Size

    173KB

  • Sample

    230611-kge48agg77

  • MD5

    8772b95d858f1794134ce70cbb5c3518

  • SHA1

    58435a38a391cab01147b62561120ce445dc0aed

  • SHA256

    ddda89a72b9ff145aec3136a5386f14057913596adabd6927a97044f36e7e647

  • SHA512

    cfe7e078b93556e695869a20d941f80b9de76fac84bad962280fe790279a7449f812f7d6abef689faba89e8d94c19dfd0804bbba181db4b009dc4a61e1653ec5

  • SSDEEP

    3072:crbYm66HKzLSFYuxN4eCeWC/qUq8e8hh:ObYn/SelW/qUq

Malware Config

Extracted

Family

redline

Botnet

dast

C2

83.97.73.129:19068

Attributes
  • auth_value

    17d71bf1a3f93284f5848e00b0dd8222

Targets

    • Target

      06546799.dat

    • Size

      173KB

    • MD5

      8772b95d858f1794134ce70cbb5c3518

    • SHA1

      58435a38a391cab01147b62561120ce445dc0aed

    • SHA256

      ddda89a72b9ff145aec3136a5386f14057913596adabd6927a97044f36e7e647

    • SHA512

      cfe7e078b93556e695869a20d941f80b9de76fac84bad962280fe790279a7449f812f7d6abef689faba89e8d94c19dfd0804bbba181db4b009dc4a61e1653ec5

    • SSDEEP

      3072:crbYm66HKzLSFYuxN4eCeWC/qUq8e8hh:ObYn/SelW/qUq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks