General

  • Target

    6f90641debb65c1a20954d37231c8f03bd0730f557b07019ae2dec05df7e86be

  • Size

    369KB

  • Sample

    211016-bq1b3scden

  • MD5

    d11d414c2db40ee2e8bc9c79caed795a

  • SHA1

    50b3234057889b2eb48a61704400b75b2805aded

  • SHA256

    6f90641debb65c1a20954d37231c8f03bd0730f557b07019ae2dec05df7e86be

  • SHA512

    a65970f3946ccbbfecace5beb963cc0656c3f11a1d7258ffd008775d8490c4a606a5c6e5ce1dc39bcca2b06f2133363f86f7d22eb438c44e01c06d711f7ead8d

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      6f90641debb65c1a20954d37231c8f03bd0730f557b07019ae2dec05df7e86be

    • Size

      369KB

    • MD5

      d11d414c2db40ee2e8bc9c79caed795a

    • SHA1

      50b3234057889b2eb48a61704400b75b2805aded

    • SHA256

      6f90641debb65c1a20954d37231c8f03bd0730f557b07019ae2dec05df7e86be

    • SHA512

      a65970f3946ccbbfecace5beb963cc0656c3f11a1d7258ffd008775d8490c4a606a5c6e5ce1dc39bcca2b06f2133363f86f7d22eb438c44e01c06d711f7ead8d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks