General

  • Target

    7609fffb53f31f3c3db2c6119c5b1c209f291cde1fc4b25ec04106a1ffcc9183

  • Size

    239KB

  • Sample

    210926-yk52psfbhr

  • MD5

    d89435e957ff060b5992d5d576e240b7

  • SHA1

    81b49751f15d9af0eb74821824a5d1e9746481cc

  • SHA256

    7609fffb53f31f3c3db2c6119c5b1c209f291cde1fc4b25ec04106a1ffcc9183

  • SHA512

    db5f500ae3a265a0e0d63c0e96d0fb9ba26600765479b9ddff34c9cf459b4a04d609d3cf504a4193521149758d494a07d60d59a1c27968822abe6769f824e194

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.20:13441

Targets

    • Target

      7609fffb53f31f3c3db2c6119c5b1c209f291cde1fc4b25ec04106a1ffcc9183

    • Size

      239KB

    • MD5

      d89435e957ff060b5992d5d576e240b7

    • SHA1

      81b49751f15d9af0eb74821824a5d1e9746481cc

    • SHA256

      7609fffb53f31f3c3db2c6119c5b1c209f291cde1fc4b25ec04106a1ffcc9183

    • SHA512

      db5f500ae3a265a0e0d63c0e96d0fb9ba26600765479b9ddff34c9cf459b4a04d609d3cf504a4193521149758d494a07d60d59a1c27968822abe6769f824e194

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks