General

  • Target

    0854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715

  • Size

    304KB

  • Sample

    240516-2jwy7abh81

  • MD5

    9faf597de46ed64912a01491fe550d33

  • SHA1

    49203277926355afd49393782ae4e01802ad48af

  • SHA256

    0854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715

  • SHA512

    ef8a7a8566eaf962c4e21d49d9c1583ed2cdc9c2751ce75133a9765d2fa6dc511fc6cc99ea871eb83d50bd08a31cb0b25c03f27b8e6f351861231910a6cf1a1e

  • SSDEEP

    3072:kq6EgY6iorUjVA8/wPTuSIuVTAPtASirVcZqf7D34teqiOLibBO2:PqY6inwPlIuVTAlAlVcZqf7DIXL

Malware Config

Extracted

Family

redline

Botnet

1

C2

185.215.113.67:26260

Targets

    • Target

      0854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715

    • Size

      304KB

    • MD5

      9faf597de46ed64912a01491fe550d33

    • SHA1

      49203277926355afd49393782ae4e01802ad48af

    • SHA256

      0854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715

    • SHA512

      ef8a7a8566eaf962c4e21d49d9c1583ed2cdc9c2751ce75133a9765d2fa6dc511fc6cc99ea871eb83d50bd08a31cb0b25c03f27b8e6f351861231910a6cf1a1e

    • SSDEEP

      3072:kq6EgY6iorUjVA8/wPTuSIuVTAPtASirVcZqf7D34teqiOLibBO2:PqY6inwPlIuVTAlAlVcZqf7DIXL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks