General

  • Target

    d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a

  • Size

    586KB

  • Sample

    210821-hxlm9bc3p6

  • MD5

    1cb884ef5dc76a942f06f07fe147b31d

  • SHA1

    d23f3f659507d19d5d46fccd83562043f1ec6d89

  • SHA256

    d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a

  • SHA512

    60f7cbc84933ce0baf817d0acfb75a3558bb5c501ad22937938555559b36c16b40cd964d0336ade597b28c446b520cbc742169437c03d253cd30b7f346b79d36

Malware Config

Extracted

Family

redline

Botnet

dibild

C2

135.148.139.222:33569

Targets

    • Target

      d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a

    • Size

      586KB

    • MD5

      1cb884ef5dc76a942f06f07fe147b31d

    • SHA1

      d23f3f659507d19d5d46fccd83562043f1ec6d89

    • SHA256

      d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a

    • SHA512

      60f7cbc84933ce0baf817d0acfb75a3558bb5c501ad22937938555559b36c16b40cd964d0336ade597b28c446b520cbc742169437c03d253cd30b7f346b79d36

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks