General

  • Target

    7d080b620bbbc1b2f02b2a2fd8623ec8

  • Size

    291KB

  • Sample

    210913-q8qb6adgf4

  • MD5

    7d080b620bbbc1b2f02b2a2fd8623ec8

  • SHA1

    4cd209f549b97a1087b8111962e90d4867c3e55b

  • SHA256

    efe9ac26875d3be8e971947fa4fbaadc5a3c6e6d202a50c716a90f24e5974e25

  • SHA512

    ec972e8b8497e626c431b6665aabb4b167defe4c7d6d4b85e62895a7851e05f136eb89f9b9d4767764404c90706b4cfb6b6f1f60f308b33562d9cd03363666df

Malware Config

Extracted

Family

redline

Botnet

10fk

C2

185.45.192.203:80

Targets

    • Target

      7d080b620bbbc1b2f02b2a2fd8623ec8

    • Size

      291KB

    • MD5

      7d080b620bbbc1b2f02b2a2fd8623ec8

    • SHA1

      4cd209f549b97a1087b8111962e90d4867c3e55b

    • SHA256

      efe9ac26875d3be8e971947fa4fbaadc5a3c6e6d202a50c716a90f24e5974e25

    • SHA512

      ec972e8b8497e626c431b6665aabb4b167defe4c7d6d4b85e62895a7851e05f136eb89f9b9d4767764404c90706b4cfb6b6f1f60f308b33562d9cd03363666df

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks