General

  • Target

    284b6f22eee37d06f6e70cd1ff3d1955b39498d58c2a45c3fd5cd0aabf3fbc71

  • Size

    340KB

  • Sample

    230717-3sh95afd32

  • MD5

    7ee0cad262eab316b00f8fd96095f00d

  • SHA1

    f877a61cd744ecb67b5ef1349b16f59113665340

  • SHA256

    284b6f22eee37d06f6e70cd1ff3d1955b39498d58c2a45c3fd5cd0aabf3fbc71

  • SHA512

    4f6791657c4f3db1507ee898429c408cad2f2163e6d077051c8833cee2fa6d6fcca6a8acfecee8cf6fae729ad97e65927e789ce657eb70a25fb40f52b0412001

  • SSDEEP

    6144:OC4DSH0R6X0lHa+rXSt871QLTAMa6XTb+eKv:OFDSHiTH/7Cza6X4

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

194.26.135.162:2920

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      284b6f22eee37d06f6e70cd1ff3d1955b39498d58c2a45c3fd5cd0aabf3fbc71

    • Size

      340KB

    • MD5

      7ee0cad262eab316b00f8fd96095f00d

    • SHA1

      f877a61cd744ecb67b5ef1349b16f59113665340

    • SHA256

      284b6f22eee37d06f6e70cd1ff3d1955b39498d58c2a45c3fd5cd0aabf3fbc71

    • SHA512

      4f6791657c4f3db1507ee898429c408cad2f2163e6d077051c8833cee2fa6d6fcca6a8acfecee8cf6fae729ad97e65927e789ce657eb70a25fb40f52b0412001

    • SSDEEP

      6144:OC4DSH0R6X0lHa+rXSt871QLTAMa6XTb+eKv:OFDSHiTH/7Cza6X4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks