General

  • Target

    11821df0179e7acadb1226ffb045b8cf.exe

  • Size

    100KB

  • Sample

    210801-drg7blvm3a

  • MD5

    11821df0179e7acadb1226ffb045b8cf

  • SHA1

    fd30b6b8fb5250d3816922b58b2921e7f6f8b473

  • SHA256

    6d807d0723b2a5cc11bb2f7e83b678cfd9f981c17dc9fa32d6c79aa42dfd31bd

  • SHA512

    3aa6a4f81636fbac9c19bc0fb451cd9241376e53b8d68ce0a0d56f841c0d4662fe566e2ef97ddf968120a29c880821cbb1679596f43774920fdae630afd58532

Malware Config

Extracted

Family

redline

Botnet

abobi isid

C2

209.250.247.73:64156

Targets

    • Target

      11821df0179e7acadb1226ffb045b8cf.exe

    • Size

      100KB

    • MD5

      11821df0179e7acadb1226ffb045b8cf

    • SHA1

      fd30b6b8fb5250d3816922b58b2921e7f6f8b473

    • SHA256

      6d807d0723b2a5cc11bb2f7e83b678cfd9f981c17dc9fa32d6c79aa42dfd31bd

    • SHA512

      3aa6a4f81636fbac9c19bc0fb451cd9241376e53b8d68ce0a0d56f841c0d4662fe566e2ef97ddf968120a29c880821cbb1679596f43774920fdae630afd58532

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks