General

  • Target

    bd4ecaf6b969238a33eb36e2dedecfabd449a7e275713b2525e8f2909ce4d2fc

  • Size

    341KB

  • Sample

    210926-rsh4ksehbq

  • MD5

    fcb058231b57fa2fb43637a32ba90493

  • SHA1

    9e9aeef28ef40b1901d948c6f8809c5b553e082a

  • SHA256

    bd4ecaf6b969238a33eb36e2dedecfabd449a7e275713b2525e8f2909ce4d2fc

  • SHA512

    5d22ff3589b2a721c44b779d024cd92a344f8988b5c64f72541a963957db50886014da16f1229416e03f1f81ee803e1a5aa43fe8b9b9efb4f8271f8d5d7518dd

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      bd4ecaf6b969238a33eb36e2dedecfabd449a7e275713b2525e8f2909ce4d2fc

    • Size

      341KB

    • MD5

      fcb058231b57fa2fb43637a32ba90493

    • SHA1

      9e9aeef28ef40b1901d948c6f8809c5b553e082a

    • SHA256

      bd4ecaf6b969238a33eb36e2dedecfabd449a7e275713b2525e8f2909ce4d2fc

    • SHA512

      5d22ff3589b2a721c44b779d024cd92a344f8988b5c64f72541a963957db50886014da16f1229416e03f1f81ee803e1a5aa43fe8b9b9efb4f8271f8d5d7518dd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks