General

  • Target

    02699d82bbb4b85d9785a6cd83fd639382ffb848d2a4abcadf503a5b766c5af6

  • Size

    262KB

  • Sample

    211009-h9fkcafbdq

  • MD5

    2de272153c37cee822122eec4ad0169d

  • SHA1

    ab981e60474d8315283d605cfbc337b687fd33d5

  • SHA256

    02699d82bbb4b85d9785a6cd83fd639382ffb848d2a4abcadf503a5b766c5af6

  • SHA512

    3c7ad685bf139b28fade2044414fc00aef589817b649ffd00f1f0c5cfbc8a934a2a353a3e06ac412ce0e489be0a7d16b079753ba19cba65ffc2c4f78a25522e1

Malware Config

Extracted

Family

redline

Botnet

z0rm1on

C2

185.215.113.94:54621

Targets

    • Target

      02699d82bbb4b85d9785a6cd83fd639382ffb848d2a4abcadf503a5b766c5af6

    • Size

      262KB

    • MD5

      2de272153c37cee822122eec4ad0169d

    • SHA1

      ab981e60474d8315283d605cfbc337b687fd33d5

    • SHA256

      02699d82bbb4b85d9785a6cd83fd639382ffb848d2a4abcadf503a5b766c5af6

    • SHA512

      3c7ad685bf139b28fade2044414fc00aef589817b649ffd00f1f0c5cfbc8a934a2a353a3e06ac412ce0e489be0a7d16b079753ba19cba65ffc2c4f78a25522e1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks