General

  • Target

    4a13cca1b960fd69697a4c69105c851c.exe

  • Size

    300KB

  • Sample

    250203-gfsr5sskbs

  • MD5

    4a13cca1b960fd69697a4c69105c851c

  • SHA1

    3a71263e57ffa4a056bbb649d7173dbf7046c1da

  • SHA256

    97b8e017d9459357292e3e25e0a343aedcaf28c18ec4a05985995a0be9495984

  • SHA512

    d411ac647b6dececf30c8823d8cebf68848817338ce143030219688f0b32852fbc52721089a74ec98ce05e46532a55483b689bc446610a94e4fa029f5b885c72

  • SSDEEP

    3072:ecZqf7D34Bp/0+mAwkyg4eQEgPQB1fA0PuTVAtkxze3RweqiOL2bBOA:ecZqf7DITnWVcB1fA0GTV8kUQL

Malware Config

Extracted

Family

redline

Botnet

DANEK

C2

195.177.92.88:1912

Targets

    • Target

      4a13cca1b960fd69697a4c69105c851c.exe

    • Size

      300KB

    • MD5

      4a13cca1b960fd69697a4c69105c851c

    • SHA1

      3a71263e57ffa4a056bbb649d7173dbf7046c1da

    • SHA256

      97b8e017d9459357292e3e25e0a343aedcaf28c18ec4a05985995a0be9495984

    • SHA512

      d411ac647b6dececf30c8823d8cebf68848817338ce143030219688f0b32852fbc52721089a74ec98ce05e46532a55483b689bc446610a94e4fa029f5b885c72

    • SSDEEP

      3072:ecZqf7D34Bp/0+mAwkyg4eQEgPQB1fA0PuTVAtkxze3RweqiOL2bBOA:ecZqf7DITnWVcB1fA0GTV8kUQL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks