General

  • Target

    bc023937d9608797a84e64d9bf4dfd86.bin

  • Size

    50KB

  • Sample

    230613-b9evgsfa21

  • MD5

    c2192d2ee633bd6e5c3b2efb549552da

  • SHA1

    9b3d0dcfe8323c86d31bc0f38674199b1f8101a4

  • SHA256

    9aa03a3256f894dcc370cd1645d0621afd18aa14d6f53363766df3b6242442d3

  • SHA512

    0bf21564c451e9e48b5917c093311ae8514b867c15977c727d993aaebb7d1152ffcc0af81e69fb938a077715d171ca3e2641d75be78558e02d3d1b5771e6e941

  • SSDEEP

    768:mckgZ3xWkTPojm9i3XsSmWwcggJYF5VF6OWsSWV33t2GdDzuidRgW2/f/CPMQ7J:mJgcd3XccggKHVX39nOgR7gUMQV

Malware Config

Extracted

Family

redline

Botnet

svhot

C2

148.163.119.55:1294

Attributes
  • auth_value

    ce2de638da2779ace0221aac42f04204

Targets

    • Target

      b28d0fe10b239ce201001185b899dc71f6d2c211283b11b66252e529b4d2dc7d.exe

    • Size

      145KB

    • MD5

      bc023937d9608797a84e64d9bf4dfd86

    • SHA1

      daf0a0993de9d432c1b2fe6b464070aef1fe87b3

    • SHA256

      b28d0fe10b239ce201001185b899dc71f6d2c211283b11b66252e529b4d2dc7d

    • SHA512

      c1d76847b0f9390f99f99cf9d5b3e221052c6093b69d9cf40b18adfececd58735f9ab6fa7727b548e7253c540b128b48143840d7c76c66cfd989b5c1fd461f23

    • SSDEEP

      3072:VV+m5cVQmRSxy4ej5Xvebx2VDhcZG8e8hh:Vj4t52b2Dhcc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks