General

  • Target

    c2806d10ac2390156ffaed2fd8c03ea5.exe

  • Size

    315KB

  • Sample

    210421-ym5att6xyj

  • MD5

    c2806d10ac2390156ffaed2fd8c03ea5

  • SHA1

    645275147ee37ea40bfaf3ce63e97b545bdd5f9d

  • SHA256

    20cc86df6047d6350fb5ebc5a1aac365c6c0ca69bb6c6c0e1e3415010d0779b9

  • SHA512

    91fb3937d901d0c2a6416ecc16206038b1c06aa6316887ad62d03e339b23236c51b7625d74788aaa1975977ae5ae4713e128fdb869d0ee2fb4d5a59285c6b38f

Malware Config

Extracted

Family

redline

Botnet

118

C2

bumblebee2021.store:80

trusmileveneers.store:80

lazerprojekt.store:80

Targets

    • Target

      c2806d10ac2390156ffaed2fd8c03ea5.exe

    • Size

      315KB

    • MD5

      c2806d10ac2390156ffaed2fd8c03ea5

    • SHA1

      645275147ee37ea40bfaf3ce63e97b545bdd5f9d

    • SHA256

      20cc86df6047d6350fb5ebc5a1aac365c6c0ca69bb6c6c0e1e3415010d0779b9

    • SHA512

      91fb3937d901d0c2a6416ecc16206038b1c06aa6316887ad62d03e339b23236c51b7625d74788aaa1975977ae5ae4713e128fdb869d0ee2fb4d5a59285c6b38f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks