General

  • Target

    57e814fadf38d465a018e56145343e938d4feffbb53d203ff2fab126606cc7da

  • Size

    389KB

  • Sample

    230622-q33qasef99

  • MD5

    659cc761f0cf2b8d83219b836ea7e0f7

  • SHA1

    ec4643a0dd3cecfaae9c2732a44889f536d9cf90

  • SHA256

    57e814fadf38d465a018e56145343e938d4feffbb53d203ff2fab126606cc7da

  • SHA512

    0e3c6c6f6027f44947a9eb0a4913403d5a84b3fcde4b27fa634bf44d7175e13ef1376ed72950a2ee1fa80d31de733c729e75510da4f5c6e957650c992046fb53

  • SSDEEP

    12288:MztKepjWeeIOFOcgmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:MkNee63A6M

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Targets

    • Target

      57e814fadf38d465a018e56145343e938d4feffbb53d203ff2fab126606cc7da

    • Size

      389KB

    • MD5

      659cc761f0cf2b8d83219b836ea7e0f7

    • SHA1

      ec4643a0dd3cecfaae9c2732a44889f536d9cf90

    • SHA256

      57e814fadf38d465a018e56145343e938d4feffbb53d203ff2fab126606cc7da

    • SHA512

      0e3c6c6f6027f44947a9eb0a4913403d5a84b3fcde4b27fa634bf44d7175e13ef1376ed72950a2ee1fa80d31de733c729e75510da4f5c6e957650c992046fb53

    • SSDEEP

      12288:MztKepjWeeIOFOcgmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:MkNee63A6M

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks