General

  • Target

    fb53c4089e19cca8c8b8602ef0ae9c9614f3428b31cc7.exe

  • Size

    236KB

  • Sample

    210725-g1vcfwxtfj

  • MD5

    bec7e89ad1218ea648c8a8b74a0e3ca2

  • SHA1

    000f57c9f933fa77dc34093440d25d0a68f3aa35

  • SHA256

    fb53c4089e19cca8c8b8602ef0ae9c9614f3428b31cc7db4486a533d84195f84

  • SHA512

    2958afd91a9f4cc4b4cdb2fb2164345f277635db7fcdb04043d650709681bda864822f14a7433fae762fbb4b487bc9afa8deaef1f1db387f88f685c0f8f7f1b5

Malware Config

Extracted

Family

redline

Botnet

@evilnotlive

C2

3.68.106.170:59223

Targets

    • Target

      fb53c4089e19cca8c8b8602ef0ae9c9614f3428b31cc7.exe

    • Size

      236KB

    • MD5

      bec7e89ad1218ea648c8a8b74a0e3ca2

    • SHA1

      000f57c9f933fa77dc34093440d25d0a68f3aa35

    • SHA256

      fb53c4089e19cca8c8b8602ef0ae9c9614f3428b31cc7db4486a533d84195f84

    • SHA512

      2958afd91a9f4cc4b4cdb2fb2164345f277635db7fcdb04043d650709681bda864822f14a7433fae762fbb4b487bc9afa8deaef1f1db387f88f685c0f8f7f1b5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks