General

  • Target

    7b6fdae8b77071c524325506a47c8448cc7bba75b4af01932d88815f9835171f

  • Size

    418KB

  • Sample

    211017-zby3gachd5

  • MD5

    139d75aa7853c94232dbdf2bcb62402f

  • SHA1

    f1cd37ddd049782abdcc9417bb63fb1fa6dc004c

  • SHA256

    7b6fdae8b77071c524325506a47c8448cc7bba75b4af01932d88815f9835171f

  • SHA512

    4387210238b34e736c9b248a54409f70da8ad6abd7a74e2ea3ba1e586e20eaffe6f22ce6a43b0af11172927f098467a271c9df11c98bc57d2b57a2d0a3e7a134

Malware Config

Extracted

Family

redline

Botnet

sewPalp

C2

185.215.113.29:24645

Targets

    • Target

      7b6fdae8b77071c524325506a47c8448cc7bba75b4af01932d88815f9835171f

    • Size

      418KB

    • MD5

      139d75aa7853c94232dbdf2bcb62402f

    • SHA1

      f1cd37ddd049782abdcc9417bb63fb1fa6dc004c

    • SHA256

      7b6fdae8b77071c524325506a47c8448cc7bba75b4af01932d88815f9835171f

    • SHA512

      4387210238b34e736c9b248a54409f70da8ad6abd7a74e2ea3ba1e586e20eaffe6f22ce6a43b0af11172927f098467a271c9df11c98bc57d2b57a2d0a3e7a134

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks