General

  • Target

    8361c7add849bc8717c1da7954b851b349f0825c75a895538711bf4d865f48ed

  • Size

    629KB

  • Sample

    210831-kzqys4dvxn

  • MD5

    6d5ce1da1b99b88bf1f321941b10bbad

  • SHA1

    24a4da9ff6ce08d0cd1ec0dcdf23be3d9dbaa345

  • SHA256

    8361c7add849bc8717c1da7954b851b349f0825c75a895538711bf4d865f48ed

  • SHA512

    60cc4abaf7de2a43e867abcc6432e018f1262f8af2b2e4262f97ebb64983c6cbc927bdcdea704177ed45889ccb79c128543d136f2836c6c1f2823444793b1268

Malware Config

Extracted

Family

redline

Botnet

mix31.08

C2

185.215.113.15:6043

Targets

    • Target

      8361c7add849bc8717c1da7954b851b349f0825c75a895538711bf4d865f48ed

    • Size

      629KB

    • MD5

      6d5ce1da1b99b88bf1f321941b10bbad

    • SHA1

      24a4da9ff6ce08d0cd1ec0dcdf23be3d9dbaa345

    • SHA256

      8361c7add849bc8717c1da7954b851b349f0825c75a895538711bf4d865f48ed

    • SHA512

      60cc4abaf7de2a43e867abcc6432e018f1262f8af2b2e4262f97ebb64983c6cbc927bdcdea704177ed45889ccb79c128543d136f2836c6c1f2823444793b1268

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger

      suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks