General

  • Target

    90436a5c1d9afffc4c2381d9571326bea975efd2a4087f4f23f7d7241ee0a870

  • Size

    385KB

  • Sample

    210725-p6ycpawrfs

  • MD5

    e38207bc53574c2a51be7a24279514a7

  • SHA1

    c5a969a8bf8f496456d4f17727402f9466230991

  • SHA256

    90436a5c1d9afffc4c2381d9571326bea975efd2a4087f4f23f7d7241ee0a870

  • SHA512

    f6bda5e2e24b693af905bea7759df8ecf6c27cf83e8e5bb0a4a489dad57a4323c38d80c21963067ce214ea359261276a87be56ee7e462a5b573279119c60ec94

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

185.215.113.114:8887

Targets

    • Target

      90436a5c1d9afffc4c2381d9571326bea975efd2a4087f4f23f7d7241ee0a870

    • Size

      385KB

    • MD5

      e38207bc53574c2a51be7a24279514a7

    • SHA1

      c5a969a8bf8f496456d4f17727402f9466230991

    • SHA256

      90436a5c1d9afffc4c2381d9571326bea975efd2a4087f4f23f7d7241ee0a870

    • SHA512

      f6bda5e2e24b693af905bea7759df8ecf6c27cf83e8e5bb0a4a489dad57a4323c38d80c21963067ce214ea359261276a87be56ee7e462a5b573279119c60ec94

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks