General

  • Target

    48f4118cba6173a45ae20a3ed629520e.exe

  • Size

    316KB

  • Sample

    210421-fpa36ys8ze

  • MD5

    48f4118cba6173a45ae20a3ed629520e

  • SHA1

    adab9f57069d87789a3cac61727accedf7ca5e0c

  • SHA256

    bb057cfdc3712f80b74bcb4e64589908435c188413a08e6461995c388d5a211e

  • SHA512

    046d7cc829f2aa55b77f09d67596a2547c267080af3109a697d713177817048d541d5327343a5b314d24629d699efa401336f2fff444365f96eeb23b84f599d3

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Targets

    • Target

      48f4118cba6173a45ae20a3ed629520e.exe

    • Size

      316KB

    • MD5

      48f4118cba6173a45ae20a3ed629520e

    • SHA1

      adab9f57069d87789a3cac61727accedf7ca5e0c

    • SHA256

      bb057cfdc3712f80b74bcb4e64589908435c188413a08e6461995c388d5a211e

    • SHA512

      046d7cc829f2aa55b77f09d67596a2547c267080af3109a697d713177817048d541d5327343a5b314d24629d699efa401336f2fff444365f96eeb23b84f599d3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks