General

  • Target

    d21abe71ba2abf923b575299dc17854f

  • Size

    301KB

  • Sample

    210721-jkz2v8rkcj

  • MD5

    d21abe71ba2abf923b575299dc17854f

  • SHA1

    392e079c675a0065c6a982ec848a18f3277f30f5

  • SHA256

    3805dae603dcd659643f0888fe35b9bbbd0173c63ff5ce1ed5bf678e4fa5db90

  • SHA512

    4922444792642dcc60e7d6e60b7e9c7ffbf2239131230f82d90f33f055b954c6967643e6cfe145b39b3427876cdb9fc0d189b702354c2c7da1a2902e5f052c86

Malware Config

Extracted

Family

redline

Botnet

170

C2

147.124.222.75:42864

Targets

    • Target

      d21abe71ba2abf923b575299dc17854f

    • Size

      301KB

    • MD5

      d21abe71ba2abf923b575299dc17854f

    • SHA1

      392e079c675a0065c6a982ec848a18f3277f30f5

    • SHA256

      3805dae603dcd659643f0888fe35b9bbbd0173c63ff5ce1ed5bf678e4fa5db90

    • SHA512

      4922444792642dcc60e7d6e60b7e9c7ffbf2239131230f82d90f33f055b954c6967643e6cfe145b39b3427876cdb9fc0d189b702354c2c7da1a2902e5f052c86

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks