General

  • Target

    dd58888fdff857aaada05a63639dd62eb18db59ff49d719b9d08c92399224480

  • Size

    451KB

  • Sample

    231228-zv6awsaad5

  • MD5

    55bc839b3cfeccbef02b0895d33bfda1

  • SHA1

    2aaed760d01c2574c4ffc6e6aa26048669a23211

  • SHA256

    dd58888fdff857aaada05a63639dd62eb18db59ff49d719b9d08c92399224480

  • SHA512

    dddc3954b64c30f3508725b7a86fb22d221a5c9d1587d6c7b22d88f1fd2a8fce8ed79b9418da7d2941b210bf211182e9e9b1c062c566537522ee6a7ff52b63a8

  • SSDEEP

    6144:qiZtz1epr90wnWQgI7qEP4smV+/Eb1yHEwH/fwEBF2YEZrxp6ZTNSNBZN:VZtBO+lI7q5V2EAHLcrxU1A

Malware Config

Extracted

Family

redline

Botnet

@cham1ng

C2

45.15.156.167:80

Targets

    • Target

      dd58888fdff857aaada05a63639dd62eb18db59ff49d719b9d08c92399224480

    • Size

      451KB

    • MD5

      55bc839b3cfeccbef02b0895d33bfda1

    • SHA1

      2aaed760d01c2574c4ffc6e6aa26048669a23211

    • SHA256

      dd58888fdff857aaada05a63639dd62eb18db59ff49d719b9d08c92399224480

    • SHA512

      dddc3954b64c30f3508725b7a86fb22d221a5c9d1587d6c7b22d88f1fd2a8fce8ed79b9418da7d2941b210bf211182e9e9b1c062c566537522ee6a7ff52b63a8

    • SSDEEP

      6144:qiZtz1epr90wnWQgI7qEP4smV+/Eb1yHEwH/fwEBF2YEZrxp6ZTNSNBZN:VZtBO+lI7q5V2EAHLcrxU1A

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks