General

  • Target

    fb7598f34566f1ceb68133043cab51f06cea491f32cfe38e014f32290cf55896

  • Size

    417KB

  • Sample

    211017-wbc88acgc5

  • MD5

    5ecb7074e9f5015254585ac74eb3e4e1

  • SHA1

    8cd3bd9a0257a81d1f8c1b3e2ee6b027a8b31319

  • SHA256

    fb7598f34566f1ceb68133043cab51f06cea491f32cfe38e014f32290cf55896

  • SHA512

    9dddfb3d10cc25e53031fc28378786da39fd8366d8c145959937ada5eb60dc51908357ce2b659e2582bfcb11f0bed646e2f09388e5be87e1a313acb9550a5e83

Malware Config

Extracted

Family

redline

Botnet

sewPalp

C2

185.215.113.29:24645

Targets

    • Target

      fb7598f34566f1ceb68133043cab51f06cea491f32cfe38e014f32290cf55896

    • Size

      417KB

    • MD5

      5ecb7074e9f5015254585ac74eb3e4e1

    • SHA1

      8cd3bd9a0257a81d1f8c1b3e2ee6b027a8b31319

    • SHA256

      fb7598f34566f1ceb68133043cab51f06cea491f32cfe38e014f32290cf55896

    • SHA512

      9dddfb3d10cc25e53031fc28378786da39fd8366d8c145959937ada5eb60dc51908357ce2b659e2582bfcb11f0bed646e2f09388e5be87e1a313acb9550a5e83

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks