General

  • Target

    888ab99280a081717ec5c5749266d1bd

  • Size

    584KB

  • Sample

    210722-6asys3d5n2

  • MD5

    888ab99280a081717ec5c5749266d1bd

  • SHA1

    3a071aeadd42c1232ff2878d2adf7f1e4a629180

  • SHA256

    e726f2014db779e3605f60499f84676ceb45160c6d092bedfa115f7e09d693e8

  • SHA512

    85b78c1489ed6a8fd375380595f3597968d026de0bd0cfe58e26cd4d6590f1d171626c0a8f677cc71d7405e5e647ede4692e615fd63a63597db724da15dc2299

Malware Config

Extracted

Family

redline

Botnet

world

C2

yspasenana.xyz:80

Targets

    • Target

      888ab99280a081717ec5c5749266d1bd

    • Size

      584KB

    • MD5

      888ab99280a081717ec5c5749266d1bd

    • SHA1

      3a071aeadd42c1232ff2878d2adf7f1e4a629180

    • SHA256

      e726f2014db779e3605f60499f84676ceb45160c6d092bedfa115f7e09d693e8

    • SHA512

      85b78c1489ed6a8fd375380595f3597968d026de0bd0cfe58e26cd4d6590f1d171626c0a8f677cc71d7405e5e647ede4692e615fd63a63597db724da15dc2299

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks