General

  • Target

    11594522419e136dc720eea62ada904024e33e4afdc0d81887761d51d0725237

  • Size

    399KB

  • Sample

    230718-h4mrgahf31

  • MD5

    482fa1ec4a8eb559099007ce853762b3

  • SHA1

    195141d2434c70464bc49ec03c5eae57fa89c8c1

  • SHA256

    11594522419e136dc720eea62ada904024e33e4afdc0d81887761d51d0725237

  • SHA512

    1982faa8a3705b5923cd1ee7f289a8760fc56dbbc0c2c9ed7d9de8ac9e0beb04e19a4718613765c314f5e7a64f045594d8f374e053083e30a72962fc91234cf8

  • SSDEEP

    6144:tELf+LMAaUrgZuJU19j6ZWbjuyXB0pMs6Ti:tE7h8rgZu+1cwjuye+fi

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

194.26.135.162:2920

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Targets

    • Target

      11594522419e136dc720eea62ada904024e33e4afdc0d81887761d51d0725237

    • Size

      399KB

    • MD5

      482fa1ec4a8eb559099007ce853762b3

    • SHA1

      195141d2434c70464bc49ec03c5eae57fa89c8c1

    • SHA256

      11594522419e136dc720eea62ada904024e33e4afdc0d81887761d51d0725237

    • SHA512

      1982faa8a3705b5923cd1ee7f289a8760fc56dbbc0c2c9ed7d9de8ac9e0beb04e19a4718613765c314f5e7a64f045594d8f374e053083e30a72962fc91234cf8

    • SSDEEP

      6144:tELf+LMAaUrgZuJU19j6ZWbjuyXB0pMs6Ti:tE7h8rgZu+1cwjuye+fi

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks