General

  • Target

    659c8f7dba4a1d73f7c061fe4c6b295af9b6917da89c70449d4588cb76707f37

  • Size

    394KB

  • Sample

    210726-8lch2k3wke

  • MD5

    ad8d56193d1a34fee86c1bcc231f5b67

  • SHA1

    9a4d7f94048c044d63c74c5cd02428a0a9ced85d

  • SHA256

    659c8f7dba4a1d73f7c061fe4c6b295af9b6917da89c70449d4588cb76707f37

  • SHA512

    75e1b607346387b5049363dd3d74d594088734bcb2972d58fb4c8c2f1c2393a74d5f908a2445278cdff851ef3e3e0f99db2127e08500c2961296143535010322

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

185.215.113.114:8887

Targets

    • Target

      659c8f7dba4a1d73f7c061fe4c6b295af9b6917da89c70449d4588cb76707f37

    • Size

      394KB

    • MD5

      ad8d56193d1a34fee86c1bcc231f5b67

    • SHA1

      9a4d7f94048c044d63c74c5cd02428a0a9ced85d

    • SHA256

      659c8f7dba4a1d73f7c061fe4c6b295af9b6917da89c70449d4588cb76707f37

    • SHA512

      75e1b607346387b5049363dd3d74d594088734bcb2972d58fb4c8c2f1c2393a74d5f908a2445278cdff851ef3e3e0f99db2127e08500c2961296143535010322

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks