General

  • Target

    9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d

  • Size

    333KB

  • Sample

    211021-dvs5nsaffm

  • MD5

    50fc188ed724e7ed2e6f5b7f801274d8

  • SHA1

    9e3eb58d6433db486e35e85a91eb9c165e5d10d5

  • SHA256

    9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d

  • SHA512

    fbfbfff76e9d4150ca52c37d94395d7d4bafe6ab1fd7f78288e1130166530b2cf445ec43cd2ce22e29b9cabd006e252a3e09882aa51e74a4f16adad85339638c

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d

    • Size

      333KB

    • MD5

      50fc188ed724e7ed2e6f5b7f801274d8

    • SHA1

      9e3eb58d6433db486e35e85a91eb9c165e5d10d5

    • SHA256

      9863644608881d602575e7545ac821e3832ce7fe7314f8aaccef8453dd0d6a3d

    • SHA512

      fbfbfff76e9d4150ca52c37d94395d7d4bafe6ab1fd7f78288e1130166530b2cf445ec43cd2ce22e29b9cabd006e252a3e09882aa51e74a4f16adad85339638c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks