General

  • Target

    file.exe

  • Size

    285KB

  • Sample

    230704-wa5l3sfh65

  • MD5

    baef6b16d5ca4a0c90f0ba0fb3e5605e

  • SHA1

    dc3af269b24639aae026b8d1a38cbc467d847f9e

  • SHA256

    64d4cb3a5b533e0cfee82a3f2f4501465bfe45247d02ccfa995251bcf973b742

  • SHA512

    6a70ff2752778e112da1e28265896c9c15961d1aec6f54592157f38ff366e34a3a1e9911ad3548dd8cf95b1107e842ebc472001b388198b94f4198c1773b1ef1

  • SSDEEP

    6144:dT0Log7etAD1D0GJFNEV16lgspxyZKdGUnO3cg:u8g7etAD1D04Ix8xyvx

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

194.26.135.162:2920

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      file.exe

    • Size

      285KB

    • MD5

      baef6b16d5ca4a0c90f0ba0fb3e5605e

    • SHA1

      dc3af269b24639aae026b8d1a38cbc467d847f9e

    • SHA256

      64d4cb3a5b533e0cfee82a3f2f4501465bfe45247d02ccfa995251bcf973b742

    • SHA512

      6a70ff2752778e112da1e28265896c9c15961d1aec6f54592157f38ff366e34a3a1e9911ad3548dd8cf95b1107e842ebc472001b388198b94f4198c1773b1ef1

    • SSDEEP

      6144:dT0Log7etAD1D0GJFNEV16lgspxyZKdGUnO3cg:u8g7etAD1D04Ix8xyvx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks