General

  • Target

    4f00cab299ba73d8d1cd80a03ba7d5adaef6ae5f315a17322abfeeeeaeefe0d0

  • Size

    414KB

  • Sample

    211105-e8ed4saed2

  • MD5

    fe0b7998ff800d3031a3b0868b2519d4

  • SHA1

    be21068ac7916883830d71c25c75c73aa242bd96

  • SHA256

    4f00cab299ba73d8d1cd80a03ba7d5adaef6ae5f315a17322abfeeeeaeefe0d0

  • SHA512

    a3bc8446cc2ccec6c1430239e210e808ac175ab7951911030a5fb8a40c05ffe0bc21e23666c6d344f89d58ca9223fe4d1126b9e1f66cb31458e5654e298ccda3

Malware Config

Extracted

Family

redline

Botnet

SomeBody

C2

185.215.113.29:36224

Targets

    • Target

      4f00cab299ba73d8d1cd80a03ba7d5adaef6ae5f315a17322abfeeeeaeefe0d0

    • Size

      414KB

    • MD5

      fe0b7998ff800d3031a3b0868b2519d4

    • SHA1

      be21068ac7916883830d71c25c75c73aa242bd96

    • SHA256

      4f00cab299ba73d8d1cd80a03ba7d5adaef6ae5f315a17322abfeeeeaeefe0d0

    • SHA512

      a3bc8446cc2ccec6c1430239e210e808ac175ab7951911030a5fb8a40c05ffe0bc21e23666c6d344f89d58ca9223fe4d1126b9e1f66cb31458e5654e298ccda3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks