General

  • Target

    aa4bd26f0a7cd6a244cad4ccf5668219.exe

  • Size

    1.0MB

  • Sample

    210505-vrbefflwea

  • MD5

    aa4bd26f0a7cd6a244cad4ccf5668219

  • SHA1

    e09bfe229d0eb8875b6f25955e881779e892f5c9

  • SHA256

    67ce4fbc9577e825524b7e892648d072f026b5a4d540327546e63297a396886d

  • SHA512

    12fcea7fc31942643f10e779bc10462302917cec3bcffe2d6c9281113cbafcdc8bbe84ac97fe6371a008f58a164ed6b260e1db4151dbcb98a58e5baba8b758f4

Malware Config

Extracted

Family

redline

Botnet

crypt

C2

87.251.71.93:80

Targets

    • Target

      aa4bd26f0a7cd6a244cad4ccf5668219.exe

    • Size

      1.0MB

    • MD5

      aa4bd26f0a7cd6a244cad4ccf5668219

    • SHA1

      e09bfe229d0eb8875b6f25955e881779e892f5c9

    • SHA256

      67ce4fbc9577e825524b7e892648d072f026b5a4d540327546e63297a396886d

    • SHA512

      12fcea7fc31942643f10e779bc10462302917cec3bcffe2d6c9281113cbafcdc8bbe84ac97fe6371a008f58a164ed6b260e1db4151dbcb98a58e5baba8b758f4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks