General

  • Target

    5ef5b9af1641fc0d05431531ed2a6ef2f66732392a4883f135a37e3097ace19e

  • Size

    382KB

  • Sample

    210727-yye17kzprx

  • MD5

    591bf4ed6e8c6c49e03aff692357e776

  • SHA1

    8ac5a67cacaa0bb4bad348b3848a0ae531eb521c

  • SHA256

    5ef5b9af1641fc0d05431531ed2a6ef2f66732392a4883f135a37e3097ace19e

  • SHA512

    bdf11891f77938a62227775566cdfaa903b96760df412353e44076075d9573d3166032b4bd0b2f60019ff009721376d111006f52c0e802622c762a676ed426d7

Malware Config

Extracted

Family

redline

Botnet

SewPalpadin

C2

185.215.113.114:8887

Targets

    • Target

      5ef5b9af1641fc0d05431531ed2a6ef2f66732392a4883f135a37e3097ace19e

    • Size

      382KB

    • MD5

      591bf4ed6e8c6c49e03aff692357e776

    • SHA1

      8ac5a67cacaa0bb4bad348b3848a0ae531eb521c

    • SHA256

      5ef5b9af1641fc0d05431531ed2a6ef2f66732392a4883f135a37e3097ace19e

    • SHA512

      bdf11891f77938a62227775566cdfaa903b96760df412353e44076075d9573d3166032b4bd0b2f60019ff009721376d111006f52c0e802622c762a676ed426d7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks