General

  • Target

    546c3daf1b215eeb3df05185b1a20d95ccf691d7f4e6b5c044d85258d64236c9

  • Size

    389KB

  • Sample

    230622-qp7gbsfh7y

  • MD5

    51aa12d330be995fe32688b4541df905

  • SHA1

    0ab3d07a833885fada6f7f0ef7f120ef89e737a8

  • SHA256

    546c3daf1b215eeb3df05185b1a20d95ccf691d7f4e6b5c044d85258d64236c9

  • SHA512

    48a8a9f7e6697b527084990aafde08851a8acbf2d2d9c5f0a78d29cab8546642b57205ef75594823160ca74001ac112b42dd1e7aa74d787ca74164a109e9d94c

  • SSDEEP

    12288:I0ztKekjWeeIOZScgmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:1kuee+3A6M

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Targets

    • Target

      546c3daf1b215eeb3df05185b1a20d95ccf691d7f4e6b5c044d85258d64236c9

    • Size

      389KB

    • MD5

      51aa12d330be995fe32688b4541df905

    • SHA1

      0ab3d07a833885fada6f7f0ef7f120ef89e737a8

    • SHA256

      546c3daf1b215eeb3df05185b1a20d95ccf691d7f4e6b5c044d85258d64236c9

    • SHA512

      48a8a9f7e6697b527084990aafde08851a8acbf2d2d9c5f0a78d29cab8546642b57205ef75594823160ca74001ac112b42dd1e7aa74d787ca74164a109e9d94c

    • SSDEEP

      12288:I0ztKekjWeeIOZScgmc0D57ABb0wTH1b/rbOxzrnb2OA8efJUZmM:1kuee+3A6M

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks