General

  • Target

    0bd4dae28b60c106ca2bf9da5e0e55a0

  • Size

    383KB

  • Sample

    211022-s3lswscgaj

  • MD5

    0bd4dae28b60c106ca2bf9da5e0e55a0

  • SHA1

    5a699e5c535e56028a901d3b34175db68c369d97

  • SHA256

    1b67816993c0da768b996b377f214fcffe8e831e98bcae28ca1f87c8204ad358

  • SHA512

    966b52eecf03f5eb9f24f6b7274cc96b5d5b099e7a99ca6a66b42c11498ff3ca0be01f515ebd4792f4ea62623fe1754376d86c91206f02ad26861b4bf73113a3

Malware Config

Extracted

Family

redline

Botnet

jjfuck

C2

135.181.129.119:4805

Targets

    • Target

      0bd4dae28b60c106ca2bf9da5e0e55a0

    • Size

      383KB

    • MD5

      0bd4dae28b60c106ca2bf9da5e0e55a0

    • SHA1

      5a699e5c535e56028a901d3b34175db68c369d97

    • SHA256

      1b67816993c0da768b996b377f214fcffe8e831e98bcae28ca1f87c8204ad358

    • SHA512

      966b52eecf03f5eb9f24f6b7274cc96b5d5b099e7a99ca6a66b42c11498ff3ca0be01f515ebd4792f4ea62623fe1754376d86c91206f02ad26861b4bf73113a3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks