General

  • Target

    93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

  • Size

    292KB

  • Sample

    210913-sdxtvshacj

  • MD5

    2c8c634cd86024e6c9616eabc46cf7f9

  • SHA1

    adb07a7ff31b2aa0d8612d8674ce9b44b761fd75

  • SHA256

    93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

  • SHA512

    3eecde4e6cbc797a096f12da3d916dd4af06c211233793fd1490bbb5a4b6660ed828ecd91ed5f3dff8bbfa5c25f13e925c0e1f63447b9ed60e8e5cc43967c8cd

Malware Config

Extracted

Family

redline

Botnet

10fk

C2

185.45.192.203:80

Targets

    • Target

      93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

    • Size

      292KB

    • MD5

      2c8c634cd86024e6c9616eabc46cf7f9

    • SHA1

      adb07a7ff31b2aa0d8612d8674ce9b44b761fd75

    • SHA256

      93393c15eba11f1503e43c75a7af1ecf82da779921ca9b3373c60ce24ee918c9

    • SHA512

      3eecde4e6cbc797a096f12da3d916dd4af06c211233793fd1490bbb5a4b6660ed828ecd91ed5f3dff8bbfa5c25f13e925c0e1f63447b9ed60e8e5cc43967c8cd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks