General

  • Target

    6462eba261b9c027a27585228da42963.exe

  • Size

    384KB

  • Sample

    210616-2ex5ctlf1a

  • MD5

    6462eba261b9c027a27585228da42963

  • SHA1

    e40ec07f6ed0f1ba8839fb22db651837d7cb8a75

  • SHA256

    7130256274f84aee008d5b6c25676b0319173a0ac2c59fb820569b6d3d037742

  • SHA512

    955884e3f678bd2f2f7805c5845dd14e2d80da55af74ca2e102f6dbc19c52e89f30dfcaba80c3772e8034a5d9bebcb045b00b1bd439676f59f5b4e160b3f6f59

Malware Config

Extracted

Family

redline

Botnet

S01

C2

pupdatastart.tech:80

pupdatastart.xyz:80

pupdatastar.store:80

Targets

    • Target

      6462eba261b9c027a27585228da42963.exe

    • Size

      384KB

    • MD5

      6462eba261b9c027a27585228da42963

    • SHA1

      e40ec07f6ed0f1ba8839fb22db651837d7cb8a75

    • SHA256

      7130256274f84aee008d5b6c25676b0319173a0ac2c59fb820569b6d3d037742

    • SHA512

      955884e3f678bd2f2f7805c5845dd14e2d80da55af74ca2e102f6dbc19c52e89f30dfcaba80c3772e8034a5d9bebcb045b00b1bd439676f59f5b4e160b3f6f59

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks