General

  • Target

    16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1

  • Size

    323KB

  • Sample

    231013-rfrj7acc43

  • MD5

    eb99e041f108b8a2d7ce74b9e9225f63

  • SHA1

    3eba8159e40b85829b2eaa26c6eae47b788208a3

  • SHA256

    16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1

  • SHA512

    138fda1511f945cb446452b56e930732c66c5e50f9d0869bcc7881186bd0fa387c23a5d2e6616a49b98bffe2e5e8de9ed1c4b71cb0ecaeeaa0e8fcc0d1f6c7af

  • SSDEEP

    3072:r60VMBbY4gGRCvzOy0IigbVDeIlAIb2W0bkQkqoGIAQ3eYA/GEe0mj9jIuR:xVMBbIvgI9VyIlA22X7IQ/N+

Malware Config

Extracted

Family

redline

Botnet

@octav1an

C2

94.142.138.4:80

Targets

    • Target

      16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1

    • Size

      323KB

    • MD5

      eb99e041f108b8a2d7ce74b9e9225f63

    • SHA1

      3eba8159e40b85829b2eaa26c6eae47b788208a3

    • SHA256

      16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1

    • SHA512

      138fda1511f945cb446452b56e930732c66c5e50f9d0869bcc7881186bd0fa387c23a5d2e6616a49b98bffe2e5e8de9ed1c4b71cb0ecaeeaa0e8fcc0d1f6c7af

    • SSDEEP

      3072:r60VMBbY4gGRCvzOy0IigbVDeIlAIb2W0bkQkqoGIAQ3eYA/GEe0mj9jIuR:xVMBbIvgI9VyIlA22X7IQ/N+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks