General

  • Target

    c36d109d0ad4c8e953d922e78373b15b80d1b0ae5455df620f0a281fc40224ac

  • Size

    389KB

  • Sample

    230622-nmmyssfd8x

  • MD5

    db371975bb8c82192befaec86e84b408

  • SHA1

    43cb21b363f22f984cf9f60123eface1ec9b3275

  • SHA256

    c36d109d0ad4c8e953d922e78373b15b80d1b0ae5455df620f0a281fc40224ac

  • SHA512

    b11f36869a84655f7bd380a47c577be414e06bd2d7b5422fd8dcd0321fde7cbc1efd516ae056b4be6349212ed2d12787a4d02b0776defbc91bc08d97a7355550

  • SSDEEP

    12288:NztKeZjWeeIOwN4gmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:Nkdee03A6M

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Targets

    • Target

      c36d109d0ad4c8e953d922e78373b15b80d1b0ae5455df620f0a281fc40224ac

    • Size

      389KB

    • MD5

      db371975bb8c82192befaec86e84b408

    • SHA1

      43cb21b363f22f984cf9f60123eface1ec9b3275

    • SHA256

      c36d109d0ad4c8e953d922e78373b15b80d1b0ae5455df620f0a281fc40224ac

    • SHA512

      b11f36869a84655f7bd380a47c577be414e06bd2d7b5422fd8dcd0321fde7cbc1efd516ae056b4be6349212ed2d12787a4d02b0776defbc91bc08d97a7355550

    • SSDEEP

      12288:NztKeZjWeeIOwN4gmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:Nkdee03A6M

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks