General

  • Target

    a1c2a8d328a756b25f0f871843dd68cf12f266291f9764523d9ed1d909e43a22

  • Size

    387KB

  • Sample

    211015-ra8arabad8

  • MD5

    adf176c453f3e41fa05ee104d85a3090

  • SHA1

    42aa1b7ee4d8ebabc99e44d029230637d47c1013

  • SHA256

    a1c2a8d328a756b25f0f871843dd68cf12f266291f9764523d9ed1d909e43a22

  • SHA512

    009ac1ab669a33fd7bfa25bcba763bacfa46206e6b9c0a9159f4db33970625554cfe8e4d396cdacbad11a3f9cc0597f27af6eccc06e9ce9df7920996d6290d33

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

37.228.129.48:29795

Targets

    • Target

      a1c2a8d328a756b25f0f871843dd68cf12f266291f9764523d9ed1d909e43a22

    • Size

      387KB

    • MD5

      adf176c453f3e41fa05ee104d85a3090

    • SHA1

      42aa1b7ee4d8ebabc99e44d029230637d47c1013

    • SHA256

      a1c2a8d328a756b25f0f871843dd68cf12f266291f9764523d9ed1d909e43a22

    • SHA512

      009ac1ab669a33fd7bfa25bcba763bacfa46206e6b9c0a9159f4db33970625554cfe8e4d396cdacbad11a3f9cc0597f27af6eccc06e9ce9df7920996d6290d33

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks