General

  • Target

    5989a1a7288b59bd634e96aa1144a24e837aba062ae3add197e7d7e4f0f6ab95

  • Size

    239KB

  • Sample

    210926-v4tagafbg4

  • MD5

    ed0ae428d547f3cea8cf4c0edf001259

  • SHA1

    23ee59cc93d831ee4d738a3b724007f7a123f92f

  • SHA256

    5989a1a7288b59bd634e96aa1144a24e837aba062ae3add197e7d7e4f0f6ab95

  • SHA512

    e6a6bbb9873af9cb43c2e952d9cc2969dcb774a026f8245d8c5b92016ccaf3f7635b63b7068dbd668e0b5a5edf1550d573d90e710ecca7edc6011f8329502fe3

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      5989a1a7288b59bd634e96aa1144a24e837aba062ae3add197e7d7e4f0f6ab95

    • Size

      239KB

    • MD5

      ed0ae428d547f3cea8cf4c0edf001259

    • SHA1

      23ee59cc93d831ee4d738a3b724007f7a123f92f

    • SHA256

      5989a1a7288b59bd634e96aa1144a24e837aba062ae3add197e7d7e4f0f6ab95

    • SHA512

      e6a6bbb9873af9cb43c2e952d9cc2969dcb774a026f8245d8c5b92016ccaf3f7635b63b7068dbd668e0b5a5edf1550d573d90e710ecca7edc6011f8329502fe3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks