General

  • Target

    file

  • Size

    219KB

  • Sample

    231030-w494naee7t

  • MD5

    510e693ef4916262d8a0b69204718527

  • SHA1

    87a7877ee6c97618a9fb3b5cb274d57827425f97

  • SHA256

    48cdeb7676697b47dc59384c1eebd75b13a3b7e10b83514f94b7571c4fe8d86f

  • SHA512

    6f55608aec8417813e2565c2cf9a2f2a985e6885685111cad20c275aec2a03d82df249d23405dbd992ab8d052a788a90654a16c30d425494f7842884c467e8ae

  • SSDEEP

    3072:qRgmyg7ANgckY+tdrmjplyb1bElPaXRSd2x1SZwebKSH:XXg7ANgcLyrmjkQPY0Mx1SO5

Malware Config

Extracted

Family

redline

Botnet

100k

C2

185.173.38.57:80

Targets

    • Target

      file

    • Size

      219KB

    • MD5

      510e693ef4916262d8a0b69204718527

    • SHA1

      87a7877ee6c97618a9fb3b5cb274d57827425f97

    • SHA256

      48cdeb7676697b47dc59384c1eebd75b13a3b7e10b83514f94b7571c4fe8d86f

    • SHA512

      6f55608aec8417813e2565c2cf9a2f2a985e6885685111cad20c275aec2a03d82df249d23405dbd992ab8d052a788a90654a16c30d425494f7842884c467e8ae

    • SSDEEP

      3072:qRgmyg7ANgckY+tdrmjplyb1bElPaXRSd2x1SZwebKSH:XXg7ANgcLyrmjkQPY0Mx1SO5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks