General

  • Target

    7ecd4dc697db7b77e0d0a22429f11911dbd692db607845f055693c6f8e86fce1

  • Size

    337KB

  • Sample

    211021-lbn1lsaag4

  • MD5

    d9d29c639d5836d61598a000df87369d

  • SHA1

    95d6a37c312e1950c2836ad7b03dab2dcacafdcb

  • SHA256

    7ecd4dc697db7b77e0d0a22429f11911dbd692db607845f055693c6f8e86fce1

  • SHA512

    747e01b2e4abbfde8ecdad8e694e35ea3ccfae0e56e7a3d29a6266579258a85e04e28362d39cc9838d45246522cd9c32da5a8257a332a0af5e879b50b385ff19

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Targets

    • Target

      7ecd4dc697db7b77e0d0a22429f11911dbd692db607845f055693c6f8e86fce1

    • Size

      337KB

    • MD5

      d9d29c639d5836d61598a000df87369d

    • SHA1

      95d6a37c312e1950c2836ad7b03dab2dcacafdcb

    • SHA256

      7ecd4dc697db7b77e0d0a22429f11911dbd692db607845f055693c6f8e86fce1

    • SHA512

      747e01b2e4abbfde8ecdad8e694e35ea3ccfae0e56e7a3d29a6266579258a85e04e28362d39cc9838d45246522cd9c32da5a8257a332a0af5e879b50b385ff19

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks