General

  • Target

    a41d80e4c2f2ae5b567dd6c2efa2464e

  • Size

    104KB

  • Sample

    211102-rspalahgfr

  • MD5

    a41d80e4c2f2ae5b567dd6c2efa2464e

  • SHA1

    d707010f225c9643eb42eb1e4eaec044889d8fda

  • SHA256

    baad5e16a24978f6fb0d647b59b98f91ab1ae8d344abf3371878ec592946ad0a

  • SHA512

    26bf581ce2ae3bb252f39979d23dae48806f0c7b90ef6d89a1a85ad76f1fa3b1bf103646336b88a83424e5293c478191173d14c92759f4cb15165af234d54f7d

Malware Config

Extracted

Family

redline

Botnet

@evilnotlive

C2

185.235.128.229:20570

Targets

    • Target

      a41d80e4c2f2ae5b567dd6c2efa2464e

    • Size

      104KB

    • MD5

      a41d80e4c2f2ae5b567dd6c2efa2464e

    • SHA1

      d707010f225c9643eb42eb1e4eaec044889d8fda

    • SHA256

      baad5e16a24978f6fb0d647b59b98f91ab1ae8d344abf3371878ec592946ad0a

    • SHA512

      26bf581ce2ae3bb252f39979d23dae48806f0c7b90ef6d89a1a85ad76f1fa3b1bf103646336b88a83424e5293c478191173d14c92759f4cb15165af234d54f7d

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks