General

  • Target

    c844c77a4052cd87225ef065c71abb1d

  • Size

    269KB

  • Sample

    210828-r5hqb3lw62

  • MD5

    c844c77a4052cd87225ef065c71abb1d

  • SHA1

    a2fa85d3b42005660c622aa1e59708d38a8b57b0

  • SHA256

    d319ddd3d52abce88199f3b7d1385bb3258290139b8b05a1ef2b672af8da2fba

  • SHA512

    0e923e260e29672e9d33e924cfb775fb4eca26ebc66bee09d0b7f28983f06aa47e9f0d6c331517a6ab09d8ddf583fa0aafeb89d150d982bd20ad41a1338d3cbb

Malware Config

Extracted

Family

redline

Botnet

hello

C2

80.66.87.33:36976

Targets

    • Target

      c844c77a4052cd87225ef065c71abb1d

    • Size

      269KB

    • MD5

      c844c77a4052cd87225ef065c71abb1d

    • SHA1

      a2fa85d3b42005660c622aa1e59708d38a8b57b0

    • SHA256

      d319ddd3d52abce88199f3b7d1385bb3258290139b8b05a1ef2b672af8da2fba

    • SHA512

      0e923e260e29672e9d33e924cfb775fb4eca26ebc66bee09d0b7f28983f06aa47e9f0d6c331517a6ab09d8ddf583fa0aafeb89d150d982bd20ad41a1338d3cbb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks