General

  • Target

    6bf4f668e1358ea9384d74800e08215841fcd2029afe8c73ba28ad5d32e2be6e

  • Size

    389KB

  • Sample

    230622-mk32kadh49

  • MD5

    4ed0ba19591796e4a7f386f776b85a90

  • SHA1

    e928da149195335990a6050bcca5f5a5cad5c3b6

  • SHA256

    6bf4f668e1358ea9384d74800e08215841fcd2029afe8c73ba28ad5d32e2be6e

  • SHA512

    c66390af87c60a220b9da330c1ce392f626365f174c5adbeacee7b9c5f089daa3ab5f01bcd34bb7fc3c93d422d5e2680ccb05f134be9d9641885f43de3b9ca53

  • SSDEEP

    12288:UGztKepjWeeIOFDigmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:UGkNeeZ3A6M

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Targets

    • Target

      6bf4f668e1358ea9384d74800e08215841fcd2029afe8c73ba28ad5d32e2be6e

    • Size

      389KB

    • MD5

      4ed0ba19591796e4a7f386f776b85a90

    • SHA1

      e928da149195335990a6050bcca5f5a5cad5c3b6

    • SHA256

      6bf4f668e1358ea9384d74800e08215841fcd2029afe8c73ba28ad5d32e2be6e

    • SHA512

      c66390af87c60a220b9da330c1ce392f626365f174c5adbeacee7b9c5f089daa3ab5f01bcd34bb7fc3c93d422d5e2680ccb05f134be9d9641885f43de3b9ca53

    • SSDEEP

      12288:UGztKepjWeeIOFDigmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:UGkNeeZ3A6M

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks