General

  • Target

    5733022e0a84fede4220137c51b947633ba407457ccaf3022bcec3876b2c7d0f

  • Size

    103KB

  • Sample

    211021-1lzmesaha3

  • MD5

    4788b9f2b49471fa3f20ce9ac9fd8524

  • SHA1

    37daa0fae772bf7634f1e71339a31252b86fd9a8

  • SHA256

    5733022e0a84fede4220137c51b947633ba407457ccaf3022bcec3876b2c7d0f

  • SHA512

    6ed4f4fc69872e2c92aa64913de9dd523fed4a8afb036462ddf20e2f210f6d0cb88c887a4b148bb0b3262bc49bf4ea8b54536b73e7b093aaeec7571595609ed8

Malware Config

Extracted

Family

redline

Botnet

slovarikinstalls

C2

185.215.113.94:35535

Targets

    • Target

      5733022e0a84fede4220137c51b947633ba407457ccaf3022bcec3876b2c7d0f

    • Size

      103KB

    • MD5

      4788b9f2b49471fa3f20ce9ac9fd8524

    • SHA1

      37daa0fae772bf7634f1e71339a31252b86fd9a8

    • SHA256

      5733022e0a84fede4220137c51b947633ba407457ccaf3022bcec3876b2c7d0f

    • SHA512

      6ed4f4fc69872e2c92aa64913de9dd523fed4a8afb036462ddf20e2f210f6d0cb88c887a4b148bb0b3262bc49bf4ea8b54536b73e7b093aaeec7571595609ed8

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks