General

  • Target

    a5adaa76614892beed93e160f8e18a94ec311f17b03a242ba6963b6d94555ab3

  • Size

    239KB

  • Sample

    211104-cszzrsffc8

  • MD5

    7e92c050343f7e2e014f958d74a95d37

  • SHA1

    c5544f91841a9fb48fa8d1c5785533e147fd25ae

  • SHA256

    a5adaa76614892beed93e160f8e18a94ec311f17b03a242ba6963b6d94555ab3

  • SHA512

    00138a74308684f9a4cb011ffeef101fbadd294b3884a06f3e4059ab1cbddae1a01bf9862bfc135dfdacc66f0b7c05333788c38dab57ea156fddeff579393f89

Malware Config

Extracted

Family

redline

Botnet

SomeBody

C2

185.215.113.29:36224

Targets

    • Target

      a5adaa76614892beed93e160f8e18a94ec311f17b03a242ba6963b6d94555ab3

    • Size

      239KB

    • MD5

      7e92c050343f7e2e014f958d74a95d37

    • SHA1

      c5544f91841a9fb48fa8d1c5785533e147fd25ae

    • SHA256

      a5adaa76614892beed93e160f8e18a94ec311f17b03a242ba6963b6d94555ab3

    • SHA512

      00138a74308684f9a4cb011ffeef101fbadd294b3884a06f3e4059ab1cbddae1a01bf9862bfc135dfdacc66f0b7c05333788c38dab57ea156fddeff579393f89

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks