General

  • Target

    5a6cab02818d7f15647e5ed0c6f5331ffd86a831f4dc60c22aefa4a68de7c4ff

  • Size

    382KB

  • Sample

    211019-3xlwtahdcn

  • MD5

    97d9e6091d1fed8b5c5cc8c953e2074a

  • SHA1

    c005ca533643eee1e6becd7983f1a7c99b3a3e96

  • SHA256

    5a6cab02818d7f15647e5ed0c6f5331ffd86a831f4dc60c22aefa4a68de7c4ff

  • SHA512

    3064ea907eb067c3e1df2d054214bbb335b3d6ec8ae14934c40f94ee87de180cd4009f81292ecf49759dadaf68513198d19ce9d7d9ca8a9cd819f61a02a89fc3

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Targets

    • Target

      5a6cab02818d7f15647e5ed0c6f5331ffd86a831f4dc60c22aefa4a68de7c4ff

    • Size

      382KB

    • MD5

      97d9e6091d1fed8b5c5cc8c953e2074a

    • SHA1

      c005ca533643eee1e6becd7983f1a7c99b3a3e96

    • SHA256

      5a6cab02818d7f15647e5ed0c6f5331ffd86a831f4dc60c22aefa4a68de7c4ff

    • SHA512

      3064ea907eb067c3e1df2d054214bbb335b3d6ec8ae14934c40f94ee87de180cd4009f81292ecf49759dadaf68513198d19ce9d7d9ca8a9cd819f61a02a89fc3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks