General

  • Target

    5c93fe670c89fdc1425ea5b5738cdd31d7bc706b3ec594c2ff5ee5144fdbca53

  • Size

    411KB

  • Sample

    211105-p8w92ahacj

  • MD5

    e7bacd8db15875e6103c33c2231965f3

  • SHA1

    5d7c23f2b6c1c416c8f634579c0b511f7cc5e221

  • SHA256

    5c93fe670c89fdc1425ea5b5738cdd31d7bc706b3ec594c2ff5ee5144fdbca53

  • SHA512

    8f558a66312e02f4842a649657c9e463d5db7964e30c0db70957944a6f2e4c905281ccae4d16f1e642aff60c5b6b40271b22e57d948438135dac67abfef00f9d

Malware Config

Extracted

Family

redline

Botnet

SomeBody

C2

185.215.113.29:36224

Targets

    • Target

      5c93fe670c89fdc1425ea5b5738cdd31d7bc706b3ec594c2ff5ee5144fdbca53

    • Size

      411KB

    • MD5

      e7bacd8db15875e6103c33c2231965f3

    • SHA1

      5d7c23f2b6c1c416c8f634579c0b511f7cc5e221

    • SHA256

      5c93fe670c89fdc1425ea5b5738cdd31d7bc706b3ec594c2ff5ee5144fdbca53

    • SHA512

      8f558a66312e02f4842a649657c9e463d5db7964e30c0db70957944a6f2e4c905281ccae4d16f1e642aff60c5b6b40271b22e57d948438135dac67abfef00f9d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks