General

  • Target

    SecuriteInfo.com.Trojan.PWS.Stealer.30553.25052.24916

  • Size

    92KB

  • Sample

    210604-x6jdq3fs4a

  • MD5

    b51dff037d329ad3eda0092344075957

  • SHA1

    eb488926c64482727e331371dff2aab91527f6e2

  • SHA256

    b4068adb43934070338e61f725163bef08368f820485fc3b2ed288608f8c9e8d

  • SHA512

    026ac3a8f468d2ca5d458ec78924dd43e90e7cc9b69330994715158814e3798ad751f31b7e698303ace0f00f9bbad208d5969f6441bbb83be5f3745edb972b5f

Malware Config

Extracted

Family

redline

Botnet

Alvarezbuild

C2

91.194.11.86:14271

Targets

    • Target

      SecuriteInfo.com.Trojan.PWS.Stealer.30553.25052.24916

    • Size

      92KB

    • MD5

      b51dff037d329ad3eda0092344075957

    • SHA1

      eb488926c64482727e331371dff2aab91527f6e2

    • SHA256

      b4068adb43934070338e61f725163bef08368f820485fc3b2ed288608f8c9e8d

    • SHA512

      026ac3a8f468d2ca5d458ec78924dd43e90e7cc9b69330994715158814e3798ad751f31b7e698303ace0f00f9bbad208d5969f6441bbb83be5f3745edb972b5f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks