General

  • Target

    f733785f9d088490b784d4dc5584ebfb.bin

  • Size

    118KB

  • Sample

    240203-ega8dagec3

  • MD5

    1b82ba5eb8707944b14b6103e271b274

  • SHA1

    4397492c04afc29d649c183eaeada57aad7f3ec8

  • SHA256

    345eec7fa7500089f3ad591521ffc2288b38d8a544f0af4a27a84f3197ee696a

  • SHA512

    a636ba496ac4ce528cf3d3051048bb54798dd86b2937956b1920327c1ed80b051375c2242034f1d901a0b850a529f9829f7e7698d1272c5bd4813bd2e851d490

  • SSDEEP

    3072:ZlwusbwtOxkKUF75SLBIicZ8Jrfk4mIhTaWs0jYTe5pkiWdwODV7L:Lebw0+vN5XsJzkKo0jv5pkiZK7L

Malware Config

Extracted

Family

redline

Botnet

@oni912

C2

45.15.156.209:40481

Targets

    • Target

      e7216d8b7084c0c36d90aefaf30bb7b6d10ae2ecae700889d459ed5ab1b26a59.exe

    • Size

      313KB

    • MD5

      f733785f9d088490b784d4dc5584ebfb

    • SHA1

      6c073d4208fee7cc88a235a3759b586889b91adf

    • SHA256

      e7216d8b7084c0c36d90aefaf30bb7b6d10ae2ecae700889d459ed5ab1b26a59

    • SHA512

      43589b18333b0edcd6e300577f86de685058df5533bcbfdd3e30497aa76176008125fbd28deecaca5e6132c42cc5c0a583c34497f40dbe4ea577333eaebab899

    • SSDEEP

      3072:kA05OJdM+K9F3OFq70W09SIg8Ikn2YSxx1m6MRqfjDv/YUeqiOL2bBOE:sma9Y40r8IIDxx9MRqfjD4aL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks