General

  • Target

    c7c60e246f5025ca90622ca0eca8749452bab43e.exe

  • Size

    300KB

  • Sample

    241231-rgratatncv

  • MD5

    9848b927987f298730db70a89574fdad

  • SHA1

    c7c60e246f5025ca90622ca0eca8749452bab43e

  • SHA256

    984bfd0f35280b016c3385527d3eec75afe765bb13c67059d1d2aa31673cec04

  • SHA512

    613b646775e89039ac2107e229269228999cdc6cb691251b2e95dab7e8308c105f132a51ed0fd56cc8c756388956cb375f921142e57936bed35f3c2f41a19cda

  • SSDEEP

    3072:acZqf7D34xp/0+mA0kywMlQEg85fB1fA0PuTVAtkxz13RMeqiOL2bBOA:acZqf7DIjnGCQNB1fA0GTV8k70L

Malware Config

Extracted

Family

redline

Botnet

first

C2

212.56.41.77:1912

Targets

    • Target

      c7c60e246f5025ca90622ca0eca8749452bab43e.exe

    • Size

      300KB

    • MD5

      9848b927987f298730db70a89574fdad

    • SHA1

      c7c60e246f5025ca90622ca0eca8749452bab43e

    • SHA256

      984bfd0f35280b016c3385527d3eec75afe765bb13c67059d1d2aa31673cec04

    • SHA512

      613b646775e89039ac2107e229269228999cdc6cb691251b2e95dab7e8308c105f132a51ed0fd56cc8c756388956cb375f921142e57936bed35f3c2f41a19cda

    • SSDEEP

      3072:acZqf7D34xp/0+mA0kywMlQEg85fB1fA0PuTVAtkxz13RMeqiOL2bBOA:acZqf7DIjnGCQNB1fA0GTV8k70L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks