General

  • Target

    2828e87a24cde9ffa4d318a0a98fab8b

  • Size

    395KB

  • Sample

    210725-cpwkmqe9qj

  • MD5

    2828e87a24cde9ffa4d318a0a98fab8b

  • SHA1

    b8e22b39aebeb2724ce7f8d2edcfcdbe07bbf908

  • SHA256

    b30c723982534b09ac7736e33151c7093403b96e8cbc0c9aa58bd7cfcb6a7e32

  • SHA512

    d8cd026bbb4f218f8d3d44a139cf36e8052120980a7bae2e9ffbd0a24697de658d19889c9335f0aae812a0af75c993c7e2456e7a3efd8fb0cd77e392f2e3ecf1

Malware Config

Extracted

Family

redline

Botnet

MIX 26.07

C2

185.215.113.17:18597

Targets

    • Target

      2828e87a24cde9ffa4d318a0a98fab8b

    • Size

      395KB

    • MD5

      2828e87a24cde9ffa4d318a0a98fab8b

    • SHA1

      b8e22b39aebeb2724ce7f8d2edcfcdbe07bbf908

    • SHA256

      b30c723982534b09ac7736e33151c7093403b96e8cbc0c9aa58bd7cfcb6a7e32

    • SHA512

      d8cd026bbb4f218f8d3d44a139cf36e8052120980a7bae2e9ffbd0a24697de658d19889c9335f0aae812a0af75c993c7e2456e7a3efd8fb0cd77e392f2e3ecf1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks