General

  • Target

    17ecd03ec1da14b62fec3a1765976924b91e7bc20fb563d97cc0b681f1ae7546

  • Size

    364KB

  • Sample

    211019-rt82dsgad3

  • MD5

    b803a8e94d8938bb9e3fa2bf74cae2b8

  • SHA1

    0a669e7f5eb8cf044c5746fcd9955bb5ebbb5727

  • SHA256

    17ecd03ec1da14b62fec3a1765976924b91e7bc20fb563d97cc0b681f1ae7546

  • SHA512

    2fb8aee70ac43307f8e6a05039f5b7c456cde9c9aeaf7b7f9832b1e4798bf29bf9facc457d7045aa7d04e95e77809a4f7c02320b6075a348d5648d2f38af381c

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      17ecd03ec1da14b62fec3a1765976924b91e7bc20fb563d97cc0b681f1ae7546

    • Size

      364KB

    • MD5

      b803a8e94d8938bb9e3fa2bf74cae2b8

    • SHA1

      0a669e7f5eb8cf044c5746fcd9955bb5ebbb5727

    • SHA256

      17ecd03ec1da14b62fec3a1765976924b91e7bc20fb563d97cc0b681f1ae7546

    • SHA512

      2fb8aee70ac43307f8e6a05039f5b7c456cde9c9aeaf7b7f9832b1e4798bf29bf9facc457d7045aa7d04e95e77809a4f7c02320b6075a348d5648d2f38af381c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks