General

  • Target

    a557f57a2434180c029c72ce310e2c4d1585c2f53aea58c375634f45754757a9

  • Size

    631KB

  • Sample

    211021-1xm3rsbgcm

  • MD5

    8b9e83c83ae81fcbd74ab39b85298c04

  • SHA1

    53b8026213abed21634724f814d7f5d968ec8856

  • SHA256

    a557f57a2434180c029c72ce310e2c4d1585c2f53aea58c375634f45754757a9

  • SHA512

    3ceb1bff38c133f5e1712d38c0b16d00fc0d55b6e1df6ab6bfde1c0e836fa4091fa7148a1d9650b0984b68349e04d83dba8fd47a8a770707b2801b45a594abe1

Malware Config

Extracted

Family

redline

Botnet

22.10

C2

185.215.113.17:7700

Targets

    • Target

      a557f57a2434180c029c72ce310e2c4d1585c2f53aea58c375634f45754757a9

    • Size

      631KB

    • MD5

      8b9e83c83ae81fcbd74ab39b85298c04

    • SHA1

      53b8026213abed21634724f814d7f5d968ec8856

    • SHA256

      a557f57a2434180c029c72ce310e2c4d1585c2f53aea58c375634f45754757a9

    • SHA512

      3ceb1bff38c133f5e1712d38c0b16d00fc0d55b6e1df6ab6bfde1c0e836fa4091fa7148a1d9650b0984b68349e04d83dba8fd47a8a770707b2801b45a594abe1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger

      suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks