General

  • Target

    3861a62c8c2f52ee0b0d0eefdbb5b4a6c771c6942a5a9d08d7941d7582e27d4f

  • Size

    269KB

  • Sample

    230622-t37k2agg7x

  • MD5

    ac83471b6bbdcfdd68c5feecd4a8a8ec

  • SHA1

    7880874b62c1ffa5cd048a526de175dc0a9808b6

  • SHA256

    3861a62c8c2f52ee0b0d0eefdbb5b4a6c771c6942a5a9d08d7941d7582e27d4f

  • SHA512

    b852def5993db3eea75ccd1072f580d6c9f574c589bb85c108b980b502c82d9a1151f6a85d505ce1ec9e02881704d1c4c8867d1a1c7210e3e0ec4c1cd0b77d64

  • SSDEEP

    3072:SWKNGeeQpyFEMqytKjmPH7323neb3WDEFdgYRjd1sQ2UsJHmOpE/MWR9sx4WRm6x:ReeFTXtKjgH74nhDOgYR/+tOEQJQm

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Targets

    • Target

      3861a62c8c2f52ee0b0d0eefdbb5b4a6c771c6942a5a9d08d7941d7582e27d4f

    • Size

      269KB

    • MD5

      ac83471b6bbdcfdd68c5feecd4a8a8ec

    • SHA1

      7880874b62c1ffa5cd048a526de175dc0a9808b6

    • SHA256

      3861a62c8c2f52ee0b0d0eefdbb5b4a6c771c6942a5a9d08d7941d7582e27d4f

    • SHA512

      b852def5993db3eea75ccd1072f580d6c9f574c589bb85c108b980b502c82d9a1151f6a85d505ce1ec9e02881704d1c4c8867d1a1c7210e3e0ec4c1cd0b77d64

    • SSDEEP

      3072:SWKNGeeQpyFEMqytKjmPH7323neb3WDEFdgYRjd1sQ2UsJHmOpE/MWR9sx4WRm6x:ReeFTXtKjgH74nhDOgYR/+tOEQJQm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks