General

  • Target

    f42e9599a2d8f5ce05672ceb7.bin

  • Size

    430KB

  • Sample

    230704-rax5safc81

  • MD5

    c8e2a4447cac5de177130e007a8517ad

  • SHA1

    ad1edf4fa0f223e2cd594dffb8c8ae7743780838

  • SHA256

    ecfb252c45be65c4a194120693c9e554393aa7496e7d5679de50a6363cded8fe

  • SHA512

    146cea268506bb491bfc7f36c3dfd29c36054fe2dc0a4d266d747840c0a614ca10ab791fb512cdbee514e47f17b5e22f4dda706f51855880cb294daca6bc8a56

  • SSDEEP

    12288:ySZkAUphjWHkOlN5PeNf5m6uXF8AlFTTRShvKmL/ItkxC:3ZkA+AkkPP6mFZnTNSHjdC

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Targets

    • Target

      3de2369a807ee29f1115d2c9fec0413be0f8850c1cf201c8d03356d64218100f.exe

    • Size

      513KB

    • MD5

      f42e9599a2d8f5ce05672ceb7d2399ce

    • SHA1

      5a2101e30b05cba3d4e41363e78c723ea9648096

    • SHA256

      3de2369a807ee29f1115d2c9fec0413be0f8850c1cf201c8d03356d64218100f

    • SHA512

      1cb89eb1074008006cdf31d66529d10f28be7f1711943560cba07ebb3ba0381d6a1aebb830ecbe405fb6011039ca0dee44c96e17b70364cfe6d120d9c601a69e

    • SSDEEP

      12288:Y5BAeQ2PBsSuE5M83sTI0Zqlwub3sef23:Y5BA+lu5NIR3sef23

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks