General

  • Target

    ee7a7d37c19c55ca3aede4014658ad5f0f74651c8340a01540b0cd0cf4983fec

  • Size

    405KB

  • Sample

    210726-67lsbstmlj

  • MD5

    d087a71bdea998d88cc95c352adeb07c

  • SHA1

    0a3b219c31e1f37693edb082cf91b7877f83959e

  • SHA256

    ee7a7d37c19c55ca3aede4014658ad5f0f74651c8340a01540b0cd0cf4983fec

  • SHA512

    211fe9ee24ab61c540b112189c8f9a1630c337e0d546aa493997c767c60bb3d891e36ca657978364253a58577ab6031de8d5bf94d524153a20570bbec4bf24bc

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

185.215.113.114:8887

Targets

    • Target

      ee7a7d37c19c55ca3aede4014658ad5f0f74651c8340a01540b0cd0cf4983fec

    • Size

      405KB

    • MD5

      d087a71bdea998d88cc95c352adeb07c

    • SHA1

      0a3b219c31e1f37693edb082cf91b7877f83959e

    • SHA256

      ee7a7d37c19c55ca3aede4014658ad5f0f74651c8340a01540b0cd0cf4983fec

    • SHA512

      211fe9ee24ab61c540b112189c8f9a1630c337e0d546aa493997c767c60bb3d891e36ca657978364253a58577ab6031de8d5bf94d524153a20570bbec4bf24bc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks