General

  • Target

    5d10c182c54e9da6bb89eb3caea55c8f.exe

  • Size

    714KB

  • Sample

    211022-xcb8zscaa6

  • MD5

    5d10c182c54e9da6bb89eb3caea55c8f

  • SHA1

    943922b17869049f24a1d33a515ce5797b54699c

  • SHA256

    b8c3325bc497649787f113cee57f95a63ba7a06138fac32329f0b89814b848b7

  • SHA512

    0d0771aab741c5fa3994713cac29cb7058079dbab2a8ca34e4357fd36d69bd13713a7aa808e176380029f4a078f2ea59b9df0b5e0b3e0303acce820336f2a097

Malware Config

Extracted

Family

redline

Botnet

mix22.10

C2

185.215.113.15:21508

Targets

    • Target

      5d10c182c54e9da6bb89eb3caea55c8f.exe

    • Size

      714KB

    • MD5

      5d10c182c54e9da6bb89eb3caea55c8f

    • SHA1

      943922b17869049f24a1d33a515ce5797b54699c

    • SHA256

      b8c3325bc497649787f113cee57f95a63ba7a06138fac32329f0b89814b848b7

    • SHA512

      0d0771aab741c5fa3994713cac29cb7058079dbab2a8ca34e4357fd36d69bd13713a7aa808e176380029f4a078f2ea59b9df0b5e0b3e0303acce820336f2a097

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks