General

  • Target

    a33ef802dc116b4a87d47900a0de2cc3f69937397a00fdb38b0dc39823703d1c

  • Size

    369KB

  • Sample

    211016-d33n3scebr

  • MD5

    b7a6d42eaf7357b4af9470b3c0cb7846

  • SHA1

    f1c626394c6f6aa91e40b954fec83811442567ae

  • SHA256

    a33ef802dc116b4a87d47900a0de2cc3f69937397a00fdb38b0dc39823703d1c

  • SHA512

    5ae41c58cd0f07614cff950d54e0494138f648778d649318b044ef6ee7f935eb47d9db533163e062080bef4a13b3820e02a55667d58470f2647e226951ea6ade

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Targets

    • Target

      a33ef802dc116b4a87d47900a0de2cc3f69937397a00fdb38b0dc39823703d1c

    • Size

      369KB

    • MD5

      b7a6d42eaf7357b4af9470b3c0cb7846

    • SHA1

      f1c626394c6f6aa91e40b954fec83811442567ae

    • SHA256

      a33ef802dc116b4a87d47900a0de2cc3f69937397a00fdb38b0dc39823703d1c

    • SHA512

      5ae41c58cd0f07614cff950d54e0494138f648778d649318b044ef6ee7f935eb47d9db533163e062080bef4a13b3820e02a55667d58470f2647e226951ea6ade

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks