General

  • Target

    3ee1598dea9af57b729b47c4c30b7e68a619165aa7c3f537ec8f0316d77e462e

  • Size

    337KB

  • Sample

    211021-h55zfaaaa6

  • MD5

    3dae520c5dcb2a61f16bda91dc69a2fd

  • SHA1

    9edf6a741c3199f601b88bacc8c4dadaa3449dec

  • SHA256

    3ee1598dea9af57b729b47c4c30b7e68a619165aa7c3f537ec8f0316d77e462e

  • SHA512

    30dff9ee2a2ee4f0c45a92a4ac2671381fd3a19d5ebd2abb2a91f141a329ad7c75a2abb83ce7d45d390129faf8cb10e68d9b8ca6b2fe6edbb0a17dea786677d6

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Targets

    • Target

      3ee1598dea9af57b729b47c4c30b7e68a619165aa7c3f537ec8f0316d77e462e

    • Size

      337KB

    • MD5

      3dae520c5dcb2a61f16bda91dc69a2fd

    • SHA1

      9edf6a741c3199f601b88bacc8c4dadaa3449dec

    • SHA256

      3ee1598dea9af57b729b47c4c30b7e68a619165aa7c3f537ec8f0316d77e462e

    • SHA512

      30dff9ee2a2ee4f0c45a92a4ac2671381fd3a19d5ebd2abb2a91f141a329ad7c75a2abb83ce7d45d390129faf8cb10e68d9b8ca6b2fe6edbb0a17dea786677d6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks