General

  • Target

    0da5cb6e034d8f77823135df5d61d20d.exe

  • Size

    98KB

  • Sample

    210730-my5j3fzy5n

  • MD5

    0da5cb6e034d8f77823135df5d61d20d

  • SHA1

    638a81092fca23da85c207df85741a04a8ba255a

  • SHA256

    c7ec5e55d90f05cda97e8de87ce1026dc926e7e7aaeb4d2f5051cadd1043bc79

  • SHA512

    9439c0b26f132e9b11c7661ca9ede77a8440a3af40b88086c0c0cc86ba85a827be45c50838f076eb9f2b9bdb405599c021daa8f6e40ddcee78cd0b43390be6e3

Malware Config

Extracted

Family

redline

Botnet

daop

C2

45.76.235.60:49976

Targets

    • Target

      0da5cb6e034d8f77823135df5d61d20d.exe

    • Size

      98KB

    • MD5

      0da5cb6e034d8f77823135df5d61d20d

    • SHA1

      638a81092fca23da85c207df85741a04a8ba255a

    • SHA256

      c7ec5e55d90f05cda97e8de87ce1026dc926e7e7aaeb4d2f5051cadd1043bc79

    • SHA512

      9439c0b26f132e9b11c7661ca9ede77a8440a3af40b88086c0c0cc86ba85a827be45c50838f076eb9f2b9bdb405599c021daa8f6e40ddcee78cd0b43390be6e3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks