General

  • Target

    85421a664638ef29358000a5226b011d684044c41c98a00297e1982f1332015b

  • Size

    364KB

  • Sample

    211019-l3a8tsgefl

  • MD5

    2dd4128d6b7108c70ecaf0f56b82a428

  • SHA1

    da2c1393c397180bcd3bfdf56d5826ec9b52a704

  • SHA256

    85421a664638ef29358000a5226b011d684044c41c98a00297e1982f1332015b

  • SHA512

    2f5a87cc5f9ba4733ec4e5c5c2c865b2827da73e29c2c4a7d0a4e2c4abd45bd4432a94edbf95baa3e3c25929c0b7812e4ee69f9e5919b9221324715b618a373f

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Targets

    • Target

      85421a664638ef29358000a5226b011d684044c41c98a00297e1982f1332015b

    • Size

      364KB

    • MD5

      2dd4128d6b7108c70ecaf0f56b82a428

    • SHA1

      da2c1393c397180bcd3bfdf56d5826ec9b52a704

    • SHA256

      85421a664638ef29358000a5226b011d684044c41c98a00297e1982f1332015b

    • SHA512

      2f5a87cc5f9ba4733ec4e5c5c2c865b2827da73e29c2c4a7d0a4e2c4abd45bd4432a94edbf95baa3e3c25929c0b7812e4ee69f9e5919b9221324715b618a373f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks