General

  • Target

    432492f11fb580d554c8535ad9fdcfc9ffd65bfc6b4e5a1abb0b28959fa8195f

  • Size

    371KB

  • Sample

    230718-2y2g8afb6v

  • MD5

    8eada482a831f5ea017299665f2fb89f

  • SHA1

    884622b9db81184facfc0989562f46a2a35df119

  • SHA256

    432492f11fb580d554c8535ad9fdcfc9ffd65bfc6b4e5a1abb0b28959fa8195f

  • SHA512

    ab26b05cb927ff4a4628f4316737fdc9bb6cd3684a20c41f40362722a4928b55b18685659447b0f7d3c5c3dde00c1cba8f81f6bb462a4b0b86b68c73a5986da8

  • SSDEEP

    6144:6680o8LQDKHLBTM7I7Uhf0IcqkOPzvYTqhC7NOGMr+0:l80o8UGHLxN7w/hPzum64+

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

194.26.135.162:2920

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      432492f11fb580d554c8535ad9fdcfc9ffd65bfc6b4e5a1abb0b28959fa8195f

    • Size

      371KB

    • MD5

      8eada482a831f5ea017299665f2fb89f

    • SHA1

      884622b9db81184facfc0989562f46a2a35df119

    • SHA256

      432492f11fb580d554c8535ad9fdcfc9ffd65bfc6b4e5a1abb0b28959fa8195f

    • SHA512

      ab26b05cb927ff4a4628f4316737fdc9bb6cd3684a20c41f40362722a4928b55b18685659447b0f7d3c5c3dde00c1cba8f81f6bb462a4b0b86b68c73a5986da8

    • SSDEEP

      6144:6680o8LQDKHLBTM7I7Uhf0IcqkOPzvYTqhC7NOGMr+0:l80o8UGHLxN7w/hPzum64+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks