General

  • Target

    02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808

  • Size

    239KB

  • Sample

    210926-xw29hsfbgj

  • MD5

    1f8eba8adcc6011192cc0eb1f59c3e36

  • SHA1

    738d71b7dd93135fb4a128708ee2e6fd40ed3d4f

  • SHA256

    02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808

  • SHA512

    387f6769e1cb1c239cfbfa9b811c8da107c402bdbb1bfc20a8ca4483fe6891e83d9c8ecc423b1b200de00dda784d8426ab7c750a4bd30440dd22db3955609cd4

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.20:13441

Targets

    • Target

      02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808

    • Size

      239KB

    • MD5

      1f8eba8adcc6011192cc0eb1f59c3e36

    • SHA1

      738d71b7dd93135fb4a128708ee2e6fd40ed3d4f

    • SHA256

      02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808

    • SHA512

      387f6769e1cb1c239cfbfa9b811c8da107c402bdbb1bfc20a8ca4483fe6891e83d9c8ecc423b1b200de00dda784d8426ab7c750a4bd30440dd22db3955609cd4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks