General

  • Target

    4078aa71d541412492dca732e7a4724b

  • Size

    57KB

  • Sample

    211013-zl1daafcc9

  • MD5

    4078aa71d541412492dca732e7a4724b

  • SHA1

    c19adcb3808e32b2244eac8dbd5d3b614b09d378

  • SHA256

    582c2dda5f1db3872450ce34212515fce0f2201b2d5961d08cdb80556db7c50e

  • SHA512

    ad4891db2d00efb0341c3793e429fe4b69feb0d4db95f87a3f3793ce0e907a95e3cccf592652eaa299a2a000ae2da34c79850175fcc77a92d912454c23483e7b

Malware Config

Extracted

Family

redline

Botnet

12102021

C2

185.191.32.196:46757

Targets

    • Target

      4078aa71d541412492dca732e7a4724b

    • Size

      57KB

    • MD5

      4078aa71d541412492dca732e7a4724b

    • SHA1

      c19adcb3808e32b2244eac8dbd5d3b614b09d378

    • SHA256

      582c2dda5f1db3872450ce34212515fce0f2201b2d5961d08cdb80556db7c50e

    • SHA512

      ad4891db2d00efb0341c3793e429fe4b69feb0d4db95f87a3f3793ce0e907a95e3cccf592652eaa299a2a000ae2da34c79850175fcc77a92d912454c23483e7b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks