General

  • Target

    bf1807ec443b76a12ad675f7cb6bf23a.bin

  • Size

    113KB

  • Sample

    230902-b7jqnaaf2v

  • MD5

    d694cd348ac6ab3c6e0c84c9e942d2a2

  • SHA1

    15e6b1170b3f39f9b26113595458c1c567dc2f3e

  • SHA256

    c1882247237d272a578667c4efb1bb23380cc1f69fcc5660a45292cedf1ef0d6

  • SHA512

    f5792cfd426fa1c2cd6573a88fbc62692cfeb339f94921c1f78c418f23a0062ca5ba56dc001952fddce6ac7130246cc354febfe19fa799bb7e33bae3e01c6d28

  • SSDEEP

    3072:KKFxj/j2H0ZVJv16OwYASLy/jTrUpfCnLp:KmxjrQ0pAOvRm7UfQp

Malware Config

Extracted

Family

redline

C2

91.103.252.3:48665

Attributes
  • auth_value

    c941e5a9c764e0b2f0217e4f4c758e7a

Targets

    • Target

      f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd.exe

    • Size

      262KB

    • MD5

      bf1807ec443b76a12ad675f7cb6bf23a

    • SHA1

      d6eeec1c8cc1ac59d65c778cd66ea4084d633401

    • SHA256

      f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd

    • SHA512

      d50a035ce07479a7517dd4571fbfd9ee292e55ca64eab708dc45882b708a77f27c9c5889e4b95a5e8555c316f7ec72be6e16c5d2747fcd201d61c494753437f1

    • SSDEEP

      3072:zxWXLSyBIbiyAeqwcBbGgabMMy1AxH/HLf/Ji49WCoMY5Z+:zxWzbhdBbGgabvy1AeemZ+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks