General

  • Target

    e454f00bc3a018d9ec004473fb60d0854159d592115f84d05fd15e586ee7b193

  • Size

    658KB

  • Sample

    211019-vbabwsgbg4

  • MD5

    414de7cc46a93f8a4e8c12e654ee8b83

  • SHA1

    3126279ff30d93affbfa0902946355c50d6f1202

  • SHA256

    e454f00bc3a018d9ec004473fb60d0854159d592115f84d05fd15e586ee7b193

  • SHA512

    51f17b8bb62d1b7afc20b2215eb8173064674464255bb27a1b2367ea4eeec6d1d0e76ad37eab17e37187bdb0ce38ebed978c62bd7eb8f696da2ce896556b9bfa

Malware Config

Extracted

Family

redline

Botnet

19.10

C2

185.215.113.17:9054

Targets

    • Target

      e454f00bc3a018d9ec004473fb60d0854159d592115f84d05fd15e586ee7b193

    • Size

      658KB

    • MD5

      414de7cc46a93f8a4e8c12e654ee8b83

    • SHA1

      3126279ff30d93affbfa0902946355c50d6f1202

    • SHA256

      e454f00bc3a018d9ec004473fb60d0854159d592115f84d05fd15e586ee7b193

    • SHA512

      51f17b8bb62d1b7afc20b2215eb8173064674464255bb27a1b2367ea4eeec6d1d0e76ad37eab17e37187bdb0ce38ebed978c62bd7eb8f696da2ce896556b9bfa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks