General

  • Target

    7ef1a283833d56d0b2465c7d9211e9a21349091cf788248952cb30dc1833dae9

  • Size

    629KB

  • Sample

    210831-l8ns6rqhf6

  • MD5

    191bd8caa94fe251984ae7ead812cc40

  • SHA1

    d45d6f7faba19caad373c80bc2d36abe0f834d96

  • SHA256

    7ef1a283833d56d0b2465c7d9211e9a21349091cf788248952cb30dc1833dae9

  • SHA512

    96a6ffe9bcb15ef9e4763a26c3f817f76748fa322ea0f35486abf6f04563c29dd792e23fb2e26326362e80ef6cba7321624418ef2a14debe02f4fff1b3072436

Malware Config

Extracted

Family

redline

Botnet

mix31.08

C2

185.215.113.15:6043

Targets

    • Target

      7ef1a283833d56d0b2465c7d9211e9a21349091cf788248952cb30dc1833dae9

    • Size

      629KB

    • MD5

      191bd8caa94fe251984ae7ead812cc40

    • SHA1

      d45d6f7faba19caad373c80bc2d36abe0f834d96

    • SHA256

      7ef1a283833d56d0b2465c7d9211e9a21349091cf788248952cb30dc1833dae9

    • SHA512

      96a6ffe9bcb15ef9e4763a26c3f817f76748fa322ea0f35486abf6f04563c29dd792e23fb2e26326362e80ef6cba7321624418ef2a14debe02f4fff1b3072436

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks